010000006076000000000000031000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 18:40:53 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0xd1f86e6c357356d3, 0x0) 18:40:53 executing program 4: mq_open(&(0x7f0000000000)='^\x00', 0x40, 0x0, &(0x7f0000000040)={0x7fff, 0x7, 0x100000000, 0x3f}) 18:40:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000006c0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x2c, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x8, @remote}, {0x8, 0x2, @local}}}]}]}, 0x2c}}, 0x0) 18:40:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x16, 0x0, 0x0) 18:40:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000041000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 2: clock_adjtime(0x0, &(0x7f0000000180)={0xa7}) 18:40:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1269, 0x0) 18:40:53 executing program 4: clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, 0x0, &(0x7f0000000100)={r0}, 0x0) 18:40:53 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/175, 0xaf}], 0x1, 0x0, 0x0) 18:40:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000740010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 0: r0 = socket(0x18, 0x1, 0x0) poll(&(0x7f0000000000)=[{r0, 0x4}], 0x1, 0x81) 18:40:53 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4be52dc1d7a5a6ed, 0x0) 18:40:53 executing program 4: renameat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0xffffffffffffffff, 0x0) 18:40:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000051000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="e27d56898ec83ad791924909d1157ca6b2d5a9b385ed60bb4002d9e89c9fafcfbbe6a980ffcb8ac3077c3047429bb9384f9c9858c3d5fbf9841f441dd4aa5c57ca770c5d9adccb3142aa7646bfa1b22bc35124ff2b8ef7c1f136a222f02f639d13c189ee0896a13f2b1cc7c791d5217c9a2b544eab14b2e4ff04f70de2a4e8d83ddc8e55105ea3833b2716285a5745a76a", 0x91}], 0x1}, 0x8) 18:40:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, @can={0x1d, 0x0}, @l2tp={0x2, 0x0, @multicast1, 0x1}, @ipx={0x4, 0xb1b, 0x200, "9f49505fd250", 0x3}, 0x400, 0x0, 0x0, 0x0, 0x7fff, &(0x7f00000001c0)='wg2\x00', 0x100000001, 0x81, 0x5bc}) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001540)={0x0, @in={0x2, 0x4e23, @multicast1}, @xdp={0x2c, 0x1, r1, 0x2c}, @generic={0x11, "8c642aeaca157c5f6f388e5e10ff"}, 0xdf3e, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)='bond0\x00', 0x9, 0x9, 0x3}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002e00)={'wg2\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002ec0)=[{{&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000100)="b5549c930afceb7587d9ace8f58ec47e3adc7b30cac33d51f33444b1380aa5f487a8", 0x22}, {&(0x7f0000000280)="76df265a083911b80832319c18f54a2aeef0546c7984cac6283fad1ef94a0a152e79e85a3798c74ef381162a00ab6ef9b3b072bb38af70ea48e1ca5af4bad9139a685a4740258d2b3a880db713b8bd98ac5d325b77e9e5c8d587e16ee2dc3383323f12907fefe58de3257fc456f12ca62c6955b40505a2a8f31f41bea4e660ef7a44d1d37373e73c65a85b4049f274ecfd478cd16ed00ed5cb2d2d26b713251b2b880fbf66856e68877157a14f51f2b8e4238f2f6e78373b49c3078461883751b325", 0xc2}, {&(0x7f0000000140)="65cbf1a471680f2869125dc96966892aa40b341ff9244e6dd181b3f54675fdd2a46073f0256254436408c811b351dde2e02078239433a5", 0x37}, {&(0x7f0000001200)="05dfb141db47d1c76a8f21bc62deb8d89575bfc45f6cb96e70e5834ce4719569f8bd7629573e8a37aed1349416bdb2537947117f257797a69f14faf649f82cbae81426339f37f243bea650fb2426511c067e15b4e174f1828d6b20e4736b8af8e8fa198a9a0969713734d5e5d8902b21562f05343016f76bd42338e209502f227811df7472dbf78b937b284770fad629c1997adfbb5e55a439f05662f9097eb246592b58b2473471708acae5d62dc2b01c8b9c54fd0f5196e01b7d88", 0xbc}, {&(0x7f0000000440)="00e7957b6105ea1de036e43e681ea44a49f036225b3630446e1e32e098c89f4910c2253d4dbd680580904e5d72d862c744bbde2c0f5d3d2d3f410d98a74b1a6a3af4d03b60d638453248a3609e25c5e3e8076416fde277c78295c34c71331f5dc7630db6e33373b3e4081d1263ceea6abe0a89dc3347c23847a87ab1159f459d6254b94178fd13de45181fd6568cb2865e0dbc1fcfacf5a30a02729999100fee91f3eae9b250d77a5109aa8c00613d9f43a3b17321cfdfbd349aec60fe9a4c31d893bf9a33e368c6db4a80595517371ee713110a78d7960ed4c7d7037cb2", 0xde}, {&(0x7f0000000540)="472863bb414a045fc0ea62b91e7ef9b54640f817431deb937b0c67d1e8fb28563d36ec466d8fc3b0ca41164f4f17d1660e9fa8331e9e977b12925c274ee67ad12a5e18ff8fba628481aeb1cf7e56836f90867c2e7a64946fd6445463158155e7867983136f4cb8721015810b8e887f1396351a2dd5c2368cbf1a1231acfa9111162d1b2a23fea35091542ad1df9ba6ce1e045c07d5ec58d774378b8b9a0a332dc58eeb646a99765eff46b216e090ea0ecb63e2ab8a5add47aba1497a62c1d17f835c29f0505feaea7f00", 0xca}, {&(0x7f0000000640)="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", 0xfa}, {&(0x7f0000000180)="406f4045a9d9e49a590c68", 0xb}, {&(0x7f0000000740)="adcb71795d574b6421a92b60c06efdf14cb64a5b578b986abe537b08bdf11c67e9278cd2786466300cd66e9b66eabef6a676007ac54ae6295d53c62e9485da56f88fb8279ea2f2856048103707b5fae8d29e15c5e76be14622c00fafecce6f01d020358ec82af52e1fe3b5d7fa5d44fe6a5b3d5fcc83eb0b57620804aa62d6d8", 0x80}, {&(0x7f00000007c0)="2d1782a4c8ac9e57d897d9d553dd115c235fce69cdda5f139fbd52f0e9f006caa5616be03267ca587b8eff6787f45f89258473d396075145b5beb06eb5ffcd24d11750c96edf5f38180dbdecee7033416b48f4983cf0708acc7e044a422d7b34c0e64349d56890060c965b0ae9cdeea47c86af5e6114f934997b195c4d40fd3dec6ad157c006ff", 0x87}], 0xa, &(0x7f0000000940)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x80000000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}], 0x78}}, {{&(0x7f00000009c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000c80)=[{&(0x7f0000000a00)="98eff0623b96ca6a858743178e7f6f5a563ecdb2ab9fb6e6cd8d95cb50f0e39ecf5f0b369f489f588fe3bbc883aa3de4780352fb93a47d8925bd37c151d8e4e4a7576e01e7e8251f02da01ead4fee8ccf7f1983a8eaaf8032692ce92807600e76841bc28c1033eb6bab9", 0x6a}, {&(0x7f0000000a80)="2336af1fe581c2c1fccb28b45c5cefe441e9696e3cf4ee297cb92b27336599b8cfb273bf7a2465aa98d4040a76ad0d8ea0b09b917615161fce8dff384b10f029ece9e93ae9e1774adb7527e8768f42c4530d5323a35b46e80f170673ac1a4d8c1e86cd4bc32e12e3ae539ef98f5120e477cdeae5c1ca0e7bc16d1ac7bb9721dcb8026d42d33c2e47b479c65096f35a7f7aebbcb49b9a6db82e42523858a765c8846a1e76d85e31a8e570ae05df93ac306fff1c26c8b72a09f703d790f8ee563a4de12f5419bb62c137b35dab0beb78b9a011270c04d5cb5ffa", 0xd9}, {&(0x7f0000000b80)="94589dac0fce8a5aa8d1334cce128272c909966faf54e05baf1836dc802f584c37c9d6477b5fd3857d06a393a34a6176ca6959f3482506cf54744aedb62aeb0c6a33574c293f53c4ac9cc1721487118e30380ffb8fa88d7d46a73ce74e6180a3", 0x60}, {&(0x7f0000000c00)="e663f38daded9975e4889c675f4beacd421ad5daef058f42e22a0edcf241f11d422bda02b2acc9dfbabca61e57b861d8fdfad3869b70944562ac1d33fe32a85eddd1653d", 0x44}], 0x4, &(0x7f0000000cc0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0xc9, 0x1, 0x9, [{@private=0xa010101, 0x1f}, {@remote, 0x2}, {@remote, 0xfffffffd}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast2, @empty}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0xc8}}, {{&(0x7f0000000dc0)={0x2, 0x4e20, @private=0xa010101}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000e00)="c3d69367fde6e1021ac72b192e3290b3a6ec32fbd9443292ed03312d9d09225007ee6b404fa8432c8530300ee7aa32ad84aa97338aeb901a0c0de35b9f7e158135e6e052881371f5cebbe74b5ccf69155b78233e5621cc70c4f179c9f5c071c8503f", 0x62}, {&(0x7f0000000e80)="384f30d65f2c94493fa79af25b73e8cd52bd5219a8b06e9300bfd53fde37b127a9ab3f37fe8d6cf7b4343d4ce1901336a99b41b10210103519caeeddfee7b87258e59967dcc3dd865c059e0030351d030366ba7e4106f21d6e49c6a877569d9f06ffea41158483c796bed1948e9c4a2927ed63d6f472ee01de44c446d56641e643fbbd700798c4705b5eb72a66702464c1204855d34cfdf03fd97db2f13ac53e779e62110616fc2f73d6536cbbd96bf7f6d5383c67a85b6d48eef375de9f90a7e42f", 0xc2}], 0x2, &(0x7f0000000fc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4884}}, @ip_retopts={{0x48, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x4b, 0x0, 0x6, [0x8, 0xc743, 0x5, 0x0, 0x9]}, @timestamp_addr={0x44, 0x1c, 0x28, 0x1, 0x1, [{@broadcast, 0xb4000}, {@loopback, 0x40}, {@multicast1}]}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffc01}}], 0xd0}}, {{&(0x7f00000010c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10, &(0x7f00000011c0)=[{&(0x7f0000001100)="9341e746b3aa5ff2096994341b4d2e11a641d8a7cc5534fe8682be2e7d7cb8c0d31977250952741ef318314670c579701a22effce816aa1ae06f21f0f1d45861ad8a6b320c57c989504ad2bcc9b451771f2dc006ad2e90d6a279aecbeac00a7b69aefcce9c68d07c24297598739f7cd96b07448432aa015474ff881637d5b459a096e4ad5dffab8b830df1a4fb3f82bf730ec993cf11c26a07c615ebb94701d5e844a3916db99722ec42028c", 0xac}], 0x1, &(0x7f0000002e40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @private=0xa010102, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @local}}}], 0x70}}], 0x4, 0x0) getpeername(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x80) 18:40:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r0) 18:40:53 executing program 4: setitimer(0x0, &(0x7f0000000080)={{0x7fffffff}, {0x7f}}, 0x0) 18:40:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000007a0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 2: setitimer(0x0, &(0x7f0000000080)={{}, {0x0, 0xb}}, 0x0) getitimer(0x0, &(0x7f0000000000)) 18:40:53 executing program 3: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff}) 18:40:53 executing program 4: socket(0x18, 0x2, 0x0) 18:40:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000061000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, @can={0x1d, 0x0}, @l2tp={0x2, 0x0, @multicast1, 0x1}, @ipx={0x4, 0xb1b, 0x200, "9f49505fd250", 0x3}, 0x400, 0x0, 0x0, 0x0, 0x7fff, &(0x7f00000001c0)='wg2\x00', 0x100000001, 0x81, 0x5bc}) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @link_local}, 0x10) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001540)={0x0, @in={0x2, 0x4e23, @multicast1}, @xdp={0x2c, 0x1, r1, 0x2c}, @generic={0x11, "8c642aeaca157c5f6f388e5e10ff"}, 0xdf3e, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)='bond0\x00', 0x9, 0x9, 0x3}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002e00)={'wg2\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002ec0)=[{{&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000100)="b5549c930afceb7587d9ace8f58ec47e3adc7b30cac33d51f33444b1380aa5f487a8", 0x22}, {&(0x7f0000000280)="76df265a083911b80832319c18f54a2aeef0546c7984cac6283fad1ef94a0a152e79e85a3798c74ef381162a00ab6ef9b3b072bb38af70ea48e1ca5af4bad9139a685a4740258d2b3a880db713b8bd98ac5d325b77e9e5c8d587e16ee2dc3383323f12907fefe58de3257fc456f12ca62c6955b40505a2a8f31f41bea4e660ef7a44d1d37373e73c65a85b4049f274ecfd478cd16ed00ed5cb2d2d26b713251b2b880fbf66856e68877157a14f51f2b8e4238f2f6e78373b49c3078461883751b325", 0xc2}, {&(0x7f0000000140)="65cbf1a471680f2869125dc96966892aa40b341ff9244e6dd181b3f54675fdd2a46073f0256254436408c811b351dde2e02078239433a5", 0x37}, {&(0x7f0000001200)="05dfb141db47d1c76a8f21bc62deb8d89575bfc45f6cb96e70e5834ce4719569f8bd7629573e8a37aed1349416bdb2537947117f257797a69f14faf649f82cbae81426339f37f243bea650fb2426511c067e15b4e174f1828d6b20e4736b8af8e8fa198a9a0969713734d5e5d8902b21562f05343016f76bd42338e209502f227811df7472dbf78b937b284770fad629c1997adfbb5e55a439f05662f9097eb246592b58b2473471708acae5d62dc2b01c8b9c54fd0f5196e01b7d88", 0xbc}, {&(0x7f0000000440)="00e7957b6105ea1de036e43e681ea44a49f036225b3630446e1e32e098c89f4910c2253d4dbd680580904e5d72d862c744bbde2c0f5d3d2d3f410d98a74b1a6a3af4d03b60d638453248a3609e25c5e3e8076416fde277c78295c34c71331f5dc7630db6e33373b3e4081d1263ceea6abe0a89dc3347c23847a87ab1159f459d6254b94178fd13de45181fd6568cb2865e0dbc1fcfacf5a30a02729999100fee91f3eae9b250d77a5109aa8c00613d9f43a3b17321cfdfbd349aec60fe9a4c31d893bf9a33e368c6db4a80595517371ee713110a78d7960ed4c7d7037cb2", 0xde}, {&(0x7f0000000540)="472863bb414a045fc0ea62b91e7ef9b54640f817431deb937b0c67d1e8fb28563d36ec466d8fc3b0ca41164f4f17d1660e9fa8331e9e977b12925c274ee67ad12a5e18ff8fba628481aeb1cf7e56836f90867c2e7a64946fd6445463158155e7867983136f4cb8721015810b8e887f1396351a2dd5c2368cbf1a1231acfa9111162d1b2a23fea35091542ad1df9ba6ce1e045c07d5ec58d774378b8b9a0a332dc58eeb646a99765eff46b216e090ea0ecb63e2ab8a5add47aba1497a62c1d17f835c29f0505feaea7f00", 0xca}, {&(0x7f0000000640)="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", 0xfa}, {&(0x7f0000000180)="406f4045a9d9e49a590c68", 0xb}, {&(0x7f0000000740)="adcb71795d574b6421a92b60c06efdf14cb64a5b578b986abe537b08bdf11c67e9278cd2786466300cd66e9b66eabef6a676007ac54ae6295d53c62e9485da56f88fb8279ea2f2856048103707b5fae8d29e15c5e76be14622c00fafecce6f01d020358ec82af52e1fe3b5d7fa5d44fe6a5b3d5fcc83eb0b57620804aa62d6d8", 0x80}, {&(0x7f00000007c0)="2d1782a4c8ac9e57d897d9d553dd115c235fce69cdda5f139fbd52f0e9f006caa5616be03267ca587b8eff6787f45f89258473d396075145b5beb06eb5ffcd24d11750c96edf5f38180dbdecee7033416b48f4983cf0708acc7e044a422d7b34c0e64349d56890060c965b0ae9cdeea47c86af5e6114f934997b195c4d40fd3dec6ad157c006ff", 0x87}], 0xa, &(0x7f0000000940)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x80000000}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}], 0x78}}, {{&(0x7f00000009c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000c80)=[{&(0x7f0000000a00)="98eff0623b96ca6a858743178e7f6f5a563ecdb2ab9fb6e6cd8d95cb50f0e39ecf5f0b369f489f588fe3bbc883aa3de4780352fb93a47d8925bd37c151d8e4e4a7576e01e7e8251f02da01ead4fee8ccf7f1983a8eaaf8032692ce92807600e76841bc28c1033eb6bab9", 0x6a}, {&(0x7f0000000a80)="2336af1fe581c2c1fccb28b45c5cefe441e9696e3cf4ee297cb92b27336599b8cfb273bf7a2465aa98d4040a76ad0d8ea0b09b917615161fce8dff384b10f029ece9e93ae9e1774adb7527e8768f42c4530d5323a35b46e80f170673ac1a4d8c1e86cd4bc32e12e3ae539ef98f5120e477cdeae5c1ca0e7bc16d1ac7bb9721dcb8026d42d33c2e47b479c65096f35a7f7aebbcb49b9a6db82e42523858a765c8846a1e76d85e31a8e570ae05df93ac306fff1c26c8b72a09f703d790f8ee563a4de12f5419bb62c137b35dab0beb78b9a011270c04d5cb5ffa", 0xd9}, {&(0x7f0000000b80)="94589dac0fce8a5aa8d1334cce128272c909966faf54e05baf1836dc802f584c37c9d6477b5fd3857d06a393a34a6176ca6959f3482506cf54744aedb62aeb0c6a33574c293f53c4ac9cc1721487118e30380ffb8fa88d7d46a73ce74e6180a3", 0x60}, {&(0x7f0000000c00)="e663f38daded9975e4889c675f4beacd421ad5daef058f42e22a0edcf241f11d422bda02b2acc9dfbabca61e57b861d8fdfad3869b70944562ac1d33fe32a85eddd1653d", 0x44}], 0x4, &(0x7f0000000cc0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_retopts={{0x44, 0x0, 0x7, {[@timestamp_addr={0x44, 0x34, 0xc9, 0x1, 0x9, [{@private=0xa010101, 0x1f}, {@remote, 0x2}, {@remote, 0xfffffffd}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@multicast2, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast2, @empty}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0xc8}}, {{&(0x7f0000000dc0)={0x2, 0x4e20, @private=0xa010101}, 0x10, &(0x7f0000000f80)=[{&(0x7f0000000e00)="c3d69367fde6e1021ac72b192e3290b3a6ec32fbd9443292ed03312d9d09225007ee6b404fa8432c8530300ee7aa32ad84aa97338aeb901a0c0de35b9f7e158135e6e052881371f5cebbe74b5ccf69155b78233e5621cc70c4f179c9f5c071c8503f", 0x62}, {&(0x7f0000000e80)="384f30d65f2c94493fa79af25b73e8cd52bd5219a8b06e9300bfd53fde37b127a9ab3f37fe8d6cf7b4343d4ce1901336a99b41b10210103519caeeddfee7b87258e59967dcc3dd865c059e0030351d030366ba7e4106f21d6e49c6a877569d9f06ffea41158483c796bed1948e9c4a2927ed63d6f472ee01de44c446d56641e643fbbd700798c4705b5eb72a66702464c1204855d34cfdf03fd97db2f13ac53e779e62110616fc2f73d6536cbbd96bf7f6d5383c67a85b6d48eef375de9f90a7e42f", 0xc2}], 0x2, &(0x7f0000000fc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4884}}, @ip_retopts={{0x48, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x4b, 0x0, 0x6, [0x8, 0xc743, 0x5, 0x0, 0x9]}, @timestamp_addr={0x44, 0x1c, 0x28, 0x1, 0x1, [{@broadcast, 0xb4000}, {@loopback, 0x40}, {@multicast1}]}, @end]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffc01}}], 0xd0}}, {{&(0x7f00000010c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10, &(0x7f00000011c0)=[{&(0x7f0000001100)="9341e746b3aa5ff2096994341b4d2e11a641d8a7cc5534fe8682be2e7d7cb8c0d31977250952741ef318314670c579701a22effce816aa1ae06f21f0f1d45861ad8a6b320c57c989504ad2bcc9b451771f2dc006ad2e90d6a279aecbeac00a7b69aefcce9c68d07c24297598739f7cd96b07448432aa015474ff881637d5b459a096e4ad5dffab8b830df1a4fb3f82bf730ec993cf11c26a07c615ebb94701d5e844a3916db99722ec42028c", 0xac}], 0x1, &(0x7f0000002e40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @private=0xa010102, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @local}}}], 0x70}}], 0x4, 0x0) getpeername(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x80) 18:40:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000b00010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:53 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 18:40:53 executing program 4: setrlimit(0x4, &(0x7f0000000800)={0x0, 0x7fff}) 18:40:54 executing program 3: r0 = socket(0x2, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights], 0x10}, 0x0) 18:40:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000071000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000001b00010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x46892aab13d21a21, 0x0) 18:40:54 executing program 4: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xf7d26d50483d7400, 0x10, 0xffffffffffffff9c, 0x0) 18:40:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) pwritev(r0, &(0x7f0000001300)=[{0x0}], 0x1, 0x0, 0x0) 18:40:54 executing program 3: r0 = socket(0x18, 0x1, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000080)) 18:40:54 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000040)="4c9798070eb5eb17fad3a6bf7efa69e502e6d1e71c18a24a3900269aa5713af75174b5f87faf68aaac9547b7c1637bc330066984e26c8b29e4120a0e4e27020116ab82bd4ed98ea6bcc684f8d67d2db949", 0x51}, {&(0x7f00000000c0)="c1ad2a24628870b29e63f912f9d3f4e9cae00b4656260b8ff6f93cebfc7eae0d6f419526fd34bd4091a878573ac13b96c79465b6b7bd22342412068cf153d98ed02eb2421b215d672396c37ff2bd62058a90c07a4a0af08bc2b3ab4e027c2be7c47b88019d6a1ef1bf23206c4ea8271934abc96141cd6794ceca1f", 0x7b}, {&(0x7f0000001140)="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", 0x429}], 0x3) 18:40:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000081000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 4: r0 = socket(0x18, 0x3, 0x0) poll(&(0x7f0000000000)=[{r0, 0x187}], 0x1, 0x0) 18:40:54 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) readv(r0, &(0x7f00000005c0)=[{0x0}], 0x1000000000000338) 18:40:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000040b00010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) close(r0) 18:40:54 executing program 0: setrlimit(0x0, &(0x7f0000000000)={0x7fffffff}) 18:40:54 executing program 2: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) preadv(r0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0) 18:40:54 executing program 4: 18:40:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000091000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: 18:40:54 executing program 3: 18:40:54 executing program 4: 18:40:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000003ee0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 2: 18:40:54 executing program 0: 18:40:54 executing program 4: 18:40:54 executing program 3: 18:40:54 executing program 2: 18:40:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: 18:40:54 executing program 4: 18:40:54 executing program 3: 18:40:54 executing program 2: 18:40:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000fff0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: 18:40:54 executing program 4: 18:40:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:54 executing program 2: 18:40:54 executing program 3: 18:40:55 executing program 0: 18:40:55 executing program 4: 18:40:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000223", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:55 executing program 3: 18:40:55 executing program 4: 18:40:55 executing program 2: 18:40:55 executing program 0: 18:40:55 executing program 0: 18:40:55 executing program 4: 18:40:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000101000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:55 executing program 3: 18:40:55 executing program 2: 18:40:55 executing program 0: 18:40:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:55 executing program 4: 18:40:55 executing program 3: 18:40:55 executing program 2: 18:40:55 executing program 0: 18:40:55 executing program 4: 18:40:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003f", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000111000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:55 executing program 3: 18:40:55 executing program 2: 18:40:55 executing program 4: 18:40:55 executing program 3: 18:40:55 executing program 0: 18:40:55 executing program 2: 18:40:55 executing program 3: 18:40:55 executing program 0: 18:40:55 executing program 4: 18:40:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000040000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:55 executing program 3: 18:40:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001f1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:55 executing program 2: 18:40:55 executing program 0: 18:40:55 executing program 4: 18:40:55 executing program 2: 18:40:55 executing program 3: 18:40:56 executing program 0: 18:40:56 executing program 4: 18:40:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000080000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 0: 18:40:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000201000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 2: 18:40:56 executing program 4: 18:40:56 executing program 3: 18:40:56 executing program 0: 18:40:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000bc5201", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 2: 18:40:56 executing program 0: 18:40:56 executing program 4: 18:40:56 executing program 3: 18:40:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000003336eb211000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 2: 18:40:56 executing program 0: 18:40:56 executing program 3: 18:40:56 executing program 2: 18:40:56 executing program 4: 18:40:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000c05201", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 0: 18:40:56 executing program 3: 18:40:56 executing program 2: 18:40:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000221000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 4: 18:40:56 executing program 2: 18:40:56 executing program 3: 18:40:56 executing program 0: 18:40:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000c45201", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 2: 18:40:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000231000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:56 executing program 0: 18:40:56 executing program 3: 18:40:56 executing program 4: 18:40:56 executing program 2: 18:40:56 executing program 0: 18:40:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000c85201", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 4: 18:40:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 3: 18:40:57 executing program 0: 18:40:57 executing program 2: 18:40:57 executing program 4: 18:40:57 executing program 2: 18:40:57 executing program 0: 18:40:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000d05201", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 3: 18:40:57 executing program 2: 18:40:57 executing program 4: 18:40:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000021eb36331000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 2: 18:40:57 executing program 0: 18:40:57 executing program 4: 18:40:57 executing program 3: 18:40:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000002", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 0: 18:40:57 executing program 2: 18:40:57 executing program 4: 18:40:57 executing program 3: 18:40:57 executing program 0: 18:40:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000003f1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 2: 18:40:57 executing program 3: 18:40:57 executing program 0: 18:40:57 executing program 4: 18:40:57 executing program 2: 18:40:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000020010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 3: 18:40:57 executing program 4: 18:40:57 executing program 0: 18:40:57 executing program 2: 18:40:57 executing program 0: 18:40:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000401000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 4: 18:40:57 executing program 3: 18:40:57 executing program 0: 18:40:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000030010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:57 executing program 2: 18:40:57 executing program 4: 18:40:57 executing program 3: 18:40:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000481000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 3: 18:40:58 executing program 0: 18:40:58 executing program 2: 18:40:58 executing program 4: 18:40:58 executing program 3: 18:40:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000040010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 0: 18:40:58 executing program 2: 18:40:58 executing program 4: 18:40:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 3: 18:40:58 executing program 0: 18:40:58 executing program 2: 18:40:58 executing program 4: 18:40:58 executing program 3: 18:40:58 executing program 0: 18:40:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000050010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 4: 18:40:58 executing program 2: 18:40:58 executing program 3: 18:40:58 executing program 0: 18:40:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 2: 18:40:58 executing program 4: 18:40:58 executing program 3: 18:40:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000060010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 2: 18:40:58 executing program 0: 18:40:58 executing program 3: 18:40:58 executing program 4: 18:40:58 executing program 2: 18:40:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000681000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@abs={0x1}, 0x6e) 18:40:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x1) 18:40:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x4000000) 18:40:58 executing program 2: shmget$private(0x0, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) 18:40:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000070010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x4000000) 18:40:58 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, 0x0, 0x0) 18:40:58 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, 0x0, 0x0) 18:40:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4004) 18:40:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x200c0005) 18:40:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8000) 18:40:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006b6b6b1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4050) 18:40:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000080010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x48c0) 18:40:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x10) 18:40:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40000) 18:40:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="fd", 0x1, 0x400b0, 0x0, 0x0) 18:40:59 executing program 0: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000140)=""/218) 18:40:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x44080) 18:40:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000d00)={'sit0\x00', 0x0}) 18:40:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x20000000) 18:40:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000090010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000000c0)) 18:40:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4) 18:40:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x80054) 18:40:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x44) 18:40:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000741000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000c0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4000) 18:40:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x208b01) 18:40:59 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, 0x0, 0x0) 18:40:59 executing program 4: msgget(0x1, 0x340) 18:40:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0}}, 0x4000) 18:40:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x8000) 18:40:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000100010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={0x0}}, 0x48010) 18:40:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007a1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) 18:40:59 executing program 3: sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, 0x0, 0x0) 18:40:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x4000804) 18:40:59 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, 0x0) 18:40:59 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 18:40:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40) 18:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 18:40:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000110010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSIG(r0, 0x40045436, 0x0) 18:40:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000ffffff8c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:40:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x20042086) 18:40:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) 18:40:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x80) 18:41:00 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x800) 18:41:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x8040) 18:41:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000120010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) inotify_rm_watch(r0, 0x0) 18:41:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0xc800) 18:41:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000c27662921000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x500c0) 18:41:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000001) 18:41:00 executing program 4: timer_create(0x0, 0x0, &(0x7f00000002c0)) timer_gettime(0x0, 0x0) 18:41:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4c044) 18:41:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000200010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4000050) 18:41:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0xc004880) 18:41:00 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, 0x0, 0x0) 18:41:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000f07924951000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4000000) 18:41:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[], 0x8c}}, 0x4c000) 18:41:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xe}}, 0x488c5) 18:41:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x20000010) 18:41:00 executing program 0: sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 18:41:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000ffffff971000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r0, 0x0, 0x0) 18:41:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000220010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x10) 18:41:00 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x840) 18:41:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000040)={0x0, 0xfed1, &(0x7f0000001a80)={0x0}}, 0x40150) 18:41:00 executing program 3: sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) 18:41:00 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, 0x0) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x3c}}, 0x800) 18:41:00 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) 18:41:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000edc01000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000230010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x800) 18:41:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x80) 18:41:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x8040) 18:41:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind(r0, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80) 18:41:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x40840) 18:41:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000926276c21000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x24008800) 18:41:00 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 18:41:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4000) 18:41:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000002c0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x44000) 18:41:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000000) 18:41:01 executing program 3: semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000000)=""/75) 18:41:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000952479f01000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4) 18:41:01 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, 0x0, 0x0) 18:41:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x5) 18:41:01 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$NL80211_CMD_FRAME(r0, 0x0, 0x0) 18:41:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000000) 18:41:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000480010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001ac0)={0x0, 0xffffffffffffffe5, &(0x7f0000001a80)={0x0}}, 0xc0) 18:41:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffff41000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 18:41:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x80d0) 18:41:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20000000) 18:41:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x800) 18:41:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8800) 18:41:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20044084) 18:41:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000004c0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0xdedf44506477416c) 18:41:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffff51000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0xc) 18:41:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000180)="b3", 0x1, 0x24008800, 0x0, 0x0) 18:41:01 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) faccessat(r0, &(0x7f00000004c0)='./file0\x00', 0x0) 18:41:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x60000) 18:41:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x800) 18:41:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffff61000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, 0x0, 0x0) 18:41:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000600010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[], 0x30}}, 0x8040) 18:41:01 executing program 2: openat$urandom(0xffffffffffffff9c, 0x0, 0x404281, 0x0) 18:41:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000340)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000300)={0x0}}, 0x0) 18:41:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x800) 18:41:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffffb1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[], 0xac}}, 0x40) 18:41:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000680010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:01 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, 0x0, 0x0) 18:41:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[], 0x1f4}}, 0x4048080) 18:41:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x850) 18:41:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffdfc1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x200000d0) 18:41:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x4000890) 18:41:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000006c0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) 18:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x8084) 18:41:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x44080) 18:41:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x4080) 18:41:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffdfd1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 2: setitimer(0x9e9931d2527f371, 0x0, 0x0) 18:41:02 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x0) 18:41:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0xc010) 18:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4080) 18:41:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000740010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffffd1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 879.878511] syz-executor.2 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 18:41:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}}, 0x24040004) 18:41:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000240)="f7", 0x1, 0x10, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80) 18:41:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x8010) 18:41:02 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, 0x0, 0x0) 18:41:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 18:41:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000007a0010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x40004) 18:41:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffffe1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 18:41:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040), 0x0, 0x400b0, 0x0, 0x0) 18:41:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x20, 0x0, 0x0) 18:41:02 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 18:41:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x54) 18:41:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000b00010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000) 18:41:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000fff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 2: r0 = msgget(0x1, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000040)=""/78) 18:41:02 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002cc0)={0x0}}, 0x4004) 18:41:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x8010) 18:41:02 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r0, 0x0, 0x0) 18:41:02 executing program 2: setitimer(0x2, &(0x7f0000000040)={{0x77359400}}, 0x0) 18:41:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4) 18:41:02 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 18:41:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000b00110", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:02 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20008080) 18:41:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001fffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:03 executing program 2: mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ff7000/0x4000)=nil) 18:41:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20000800) 18:41:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x20004010) 18:41:03 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x989680}, 0x0) 18:41:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, 0x0, 0x0) 18:41:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4080) 18:41:03 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, 0x0, 0x0) 18:41:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40) 18:41:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000310", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, 0x0, 0x0) 18:41:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fcfdffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x14) 18:41:03 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x0) 18:41:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[], 0x174}}, 0x20000000) 18:41:03 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, 0x0, 0x0) 18:41:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000040) 18:41:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x48000) 18:41:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4000080) 18:41:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000ee0310", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fdfdffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000080)="d5", 0x1, 0x4000, &(0x7f0000000140)=@rc, 0x80) 18:41:03 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) pipe2(0x0, 0x0) 18:41:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x48000) 18:41:03 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 18:41:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x20004800) 18:41:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000007fffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000510", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8041) 18:41:03 executing program 2: semget(0x0, 0x0, 0x2) 18:41:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x23ad402960cd3340) 18:41:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x14}}, 0x4000090) 18:41:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000008cffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x20cd01) 18:41:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x800) 18:41:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000610", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 18:41:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x2004c090) 18:41:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000800) 18:41:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x10) 18:41:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000097ffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) 18:41:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000710", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, 0x0, 0x0) 18:41:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40890) 18:41:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4008000) 18:41:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x10) 18:41:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8040) 18:41:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000010) 18:41:04 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) read$char_usb(r0, &(0x7f0000000400)=""/196, 0xc4) 18:41:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000f4ffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x90) 18:41:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000910", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={0x0}}, 0x8010) 18:41:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40040) 18:41:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x3aef4e312408dbec) 18:41:04 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 18:41:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000f5ffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000200)) 18:41:04 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, 0x0, 0x0) 18:41:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 18:41:05 executing program 0: sigaltstack(&(0x7f0000400000/0xc00000)=nil, 0x0) 18:41:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x4000) 18:41:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[], 0x110}}, 0x4000000) 18:41:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000f6ffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001110", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:05 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, 0x0, 0x0) 18:41:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x28}}, 0x20040810) 18:41:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 18:41:05 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) 18:41:05 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, 0x0, 0x0) 18:41:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001210", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fbffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[], 0x164}}, 0x24008044) 18:41:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x1c}}, 0x4000800) 18:41:05 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000240), 0x0) 18:41:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfffffe60}}, 0x0) 18:41:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001f10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000080)={0x0, 0x9, 0x0}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x12000, 0x0, 0x0) 18:41:06 executing program 3: mprotect(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x0) 18:41:06 executing program 4: r0 = socket$inet(0x2, 0x80003, 0xfffffffa) sendmsg$sock(r0, &(0x7f0000000640)={&(0x7f0000000480)=@l2tp={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x0) 18:41:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x8880) 18:41:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fdffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffcd7}, 0x0) 18:41:06 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, 0x0, 0x0) 18:41:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000000) 18:41:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xffffffffffffff66}}, 0x0) 18:41:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000700)=ANY=[], 0x84}}, 0x40044) 18:41:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x4048000) 18:41:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000feffffff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, 0x0, 0x0) 18:41:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002210", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20040080) 18:41:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x800) 18:41:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x20008080) 18:41:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000004) 18:41:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 18:41:06 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg$SMC_PNETID_DEL(r0, 0x0, 0x0) 18:41:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4040080) 18:41:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000100000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002310", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x844) 18:41:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0xc804) 18:41:06 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$netlink(r0, 0x10e, 0x3, 0x0, &(0x7f0000001000)) 18:41:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x60}}, 0x4) 18:41:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000240)="f7", 0x1, 0x10, 0x0, 0x0) 18:41:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40050) 18:41:06 executing program 2: shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffa000/0x2000)=nil) 18:41:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x4000000) 18:41:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000480000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x8800) 18:41:06 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) accept$inet6(r0, 0x0, 0x0) 18:41:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4002) 18:41:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000003f10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4000004) 18:41:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={0x0}}, 0x20004040) 18:41:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20048880) 18:41:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000004) 18:41:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000100000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000001080)=ANY=[], 0x44}}, 0x0) 18:41:07 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, 0x0, 0x0) 18:41:07 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780)='NLBL_UNLBL\x00') 18:41:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) 18:41:07 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, 0x0) 18:41:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x8800) 18:41:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000200000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x4840) 18:41:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x2404c080) 18:41:07 executing program 4: semtimedop(0x0, 0x0, 0x0, 0x0) 18:41:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff0000e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x1, 0xa, 0x1b, 0x67, 0x0}) 18:41:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000b04010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) 18:41:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x8000) 18:41:07 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') 18:41:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000400000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x240400c0) 18:41:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x400c0) 18:41:07 executing program 4: sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) 18:41:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004810", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={0x0}}, 0x0) 18:41:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x24006000) 18:41:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000180)) 18:41:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20040040) 18:41:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000c40)={'syztnl1\x00', 0x0}) 18:41:07 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, 0x0, 0x0) 18:41:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000500000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0xa980) 18:41:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000300)={0x0, 0xffffffffffffff17, &(0x7f00000002c0)={0x0}}, 0x0) 18:41:07 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, 0x0) 18:41:07 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 18:41:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20000000) 18:41:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000900000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:07 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 18:41:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x20040080) 18:41:07 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x8303, 0x0) 18:41:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x800) 18:41:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4) 18:41:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40048000) 18:41:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x40) 18:41:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0xc0) 18:41:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000a00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006810", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f00000002c0)) 18:41:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x2000c800) 18:41:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x20000000) 18:41:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000d00)=ANY=[], 0x1bc}}, 0x40000) 18:41:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x4000000) 18:41:08 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200c2, 0x0) 18:41:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000c00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x8c0) 18:41:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4044846) 18:41:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 18:41:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x8850) 18:41:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x800) 18:41:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007410", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x4044054) 18:41:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x30}}, 0xc810) 18:41:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x48001) 18:41:08 executing program 3: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x2200, 0x0) 18:41:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000d00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 0: sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) 18:41:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x8040) 18:41:08 executing program 2: fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 18:41:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007a10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 3: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000001c0)) 18:41:08 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockname$unix(r0, 0x0, &(0x7f0000000080)) 18:41:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xfffffffffffffed8}}, 0x0) 18:41:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x8000880) 18:41:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:08 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x81800) 18:41:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x840) 18:41:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000b010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000740)=ANY=[]) 18:41:09 executing program 2: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) 18:41:09 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, 0x0, 0x0) 18:41:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000200001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, 0x0, 0x0) 18:41:09 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 18:41:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) 18:41:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4000000) 18:41:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000001b010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) [ 886.750859] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 886.750859] 18:41:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[], 0x20}}, 0x20000050) 18:41:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002480)={0x0}}, 0x20000800) 18:41:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x200c8000) 18:41:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000300001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24004001) 18:41:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x6800) 18:41:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x11) 18:41:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000040b010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) [ 886.976552] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 886.976552] 18:41:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20000010) 18:41:09 executing program 0: 18:41:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4800) 18:41:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x10) 18:41:09 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x8802, 0x0) 18:41:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000400001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0xc010) 18:41:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[], 0xd4}}, 0x10) 18:41:09 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000240)) 18:41:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000003ee10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:09 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) [ 887.249658] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 887.249658] 18:41:09 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r0, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002cc0)={0x0}}, 0x2402a844) 18:41:09 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, 0x0, 0x0) 18:41:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20004881) 18:41:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4c001) 18:41:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000500001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000fff10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r0, 0x0, 0x0) 18:41:09 executing program 0: getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 18:41:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x800) 18:41:10 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, 0x0, 0x0) [ 887.511658] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 887.511658] 18:41:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x2010) 18:41:10 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x1800, 0x0) 18:41:10 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) 18:41:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000600001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000c00000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, 0x0) 18:41:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x2c}}, 0x40000) 18:41:10 executing program 0: sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, 0x0, 0x2dcce6f6cce4658e) 18:41:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x480d0) [ 887.737920] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 887.737920] 18:41:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x800) 18:41:10 executing program 4: semctl$IPC_INFO(0x0, 0x1, 0x3, &(0x7f0000000200)=""/44) 18:41:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x400c800) 18:41:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x2) 18:41:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000700001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x8001) 18:41:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x10) 18:41:10 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r0, 0x0, 0x0) 18:41:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4000) [ 887.994291] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 887.994291] 18:41:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18:41:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x4000800) 18:41:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x24040000) 18:41:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20048040) 18:41:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x20048040) 18:41:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000800001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 18:41:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x50) 18:41:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x4) 18:41:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x8090, 0x0, 0x6) [ 888.295215] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 888.295215] 18:41:10 executing program 0: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) ioprio_get$uid(0x3, r0) 18:41:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4061800) 18:41:10 executing program 3: sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, 0x0, 0x0) 18:41:10 executing program 2: pselect6(0x40, &(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000640)={0x0}) 18:41:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000900001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:10 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) 18:41:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40) 18:41:11 executing program 4: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x101) 18:41:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xb) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 888.509554] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 888.509554] 18:41:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 18:41:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20040010) 18:41:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 18:41:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x44c04) 18:41:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000b00001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000f", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4000) 18:41:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x400c0) 18:41:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 18:41:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4040000) [ 888.833425] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 888.833425] 18:41:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x20004000) 18:41:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000f00)={0x0}}, 0x800) 18:41:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000c00001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x242602, 0x0) 18:41:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, 0x0, 0x0) 18:41:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000003fffff", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 2: [ 889.047696] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 889.047696] 18:41:11 executing program 0: 18:41:11 executing program 3: 18:41:11 executing program 4: 18:41:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000000)={0x0, 0xfff1, &(0x7f0000000040)={0x0}}, 0x4000880) 18:41:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x80) 18:41:11 executing program 3: 18:41:11 executing program 4: 18:41:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000400", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 2: [ 889.322609] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 889.322609] 18:41:11 executing program 4: 18:41:11 executing program 3: 18:41:11 executing program 0: 18:41:11 executing program 2: 18:41:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001100001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:11 executing program 3: 18:41:12 executing program 4: 18:41:12 executing program 0: 18:41:12 executing program 2: 18:41:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000800", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:12 executing program 4: 18:41:12 executing program 3: [ 889.621639] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 889.621639] 18:41:12 executing program 0: 18:41:12 executing program 2: 18:41:12 executing program 3: 18:41:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002200001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:12 executing program 4: 18:41:12 executing program 2: 18:41:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b00", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:12 executing program 0: 18:41:12 executing program 3: 18:41:12 executing program 4: 18:41:12 executing program 0: 18:41:12 executing program 2: [ 889.933127] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 889.933127] 18:41:12 executing program 4: 18:41:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002300001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:12 executing program 2: 18:41:12 executing program 3: 18:41:12 executing program 0: 18:41:12 executing program 2: 18:41:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:12 executing program 4: 18:41:12 executing program 2: [ 890.192302] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 890.192302] 18:41:12 executing program 0: 18:41:12 executing program 3: 18:41:12 executing program 4: 18:41:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002c00001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:12 executing program 2: 18:41:12 executing program 3: 18:41:12 executing program 0: 18:41:12 executing program 2: [ 890.421267] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 890.421267] 18:41:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004800", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:12 executing program 4: 18:41:12 executing program 0: 18:41:13 executing program 3: 18:41:13 executing program 0: 18:41:13 executing program 0: 18:41:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004800001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:13 executing program 2: 18:41:13 executing program 3: 18:41:13 executing program 0: 18:41:13 executing program 4: 18:41:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000b000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:13 executing program 2: 18:41:13 executing program 3: 18:41:13 executing program 0: [ 890.765409] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 890.765409] 18:41:13 executing program 4: 18:41:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004c00001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:13 executing program 3: 18:41:13 executing program 0: 18:41:13 executing program 4: 18:41:13 executing program 0: 18:41:13 executing program 2: 18:41:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000a", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:13 executing program 3: 18:41:13 executing program 0: 18:41:13 executing program 4: [ 891.017699] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 891.017699] 18:41:13 executing program 2: 18:41:13 executing program 0: 18:41:13 executing program 3: 18:41:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006000001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:13 executing program 4: 18:41:13 executing program 2: 18:41:13 executing program 3: 18:41:13 executing program 0: 18:41:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000210", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:13 executing program 4: [ 891.287774] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 891.287774] 18:41:13 executing program 3: 18:41:13 executing program 0: 18:41:13 executing program 2: 18:41:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006800001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:13 executing program 4: 18:41:13 executing program 3: 18:41:14 executing program 2: 18:41:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x240488d0) 18:41:14 executing program 0: 18:41:14 executing program 4: 18:41:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000310", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) [ 891.563330] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 891.563330] 18:41:14 executing program 3: 18:41:14 executing program 2: 18:41:14 executing program 0: 18:41:14 executing program 4: 18:41:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006c00001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:14 executing program 2: 18:41:14 executing program 3: 18:41:14 executing program 0: 18:41:14 executing program 4: 18:41:14 executing program 0: 18:41:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000410", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:14 executing program 3: [ 891.815968] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 891.815968] 18:41:14 executing program 2: 18:41:14 executing program 4: 18:41:14 executing program 0: 18:41:14 executing program 0: 18:41:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000007400001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:14 executing program 3: 18:41:14 executing program 4: 18:41:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000510", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:14 executing program 2: 18:41:14 executing program 0: 18:41:14 executing program 2: 18:41:14 executing program 3: [ 892.119838] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 892.119838] 18:41:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000610", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:14 executing program 4: 18:41:14 executing program 3: 18:41:14 executing program 2: 18:41:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000007a00001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:14 executing program 0: 18:41:14 executing program 2: 18:41:14 executing program 4: 18:41:14 executing program 3: 18:41:14 executing program 0: 18:41:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000710", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:14 executing program 2: 18:41:14 executing program 3: [ 892.440529] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 892.440529] 18:41:14 executing program 0: 18:41:15 executing program 4: 18:41:15 executing program 2: 18:41:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000003001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:15 executing program 3: 18:41:15 executing program 4: 18:41:15 executing program 0: 18:41:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000810", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:15 executing program 2: 18:41:15 executing program 4: 18:41:15 executing program 3: 18:41:15 executing program 0: 18:41:15 executing program 2: 18:41:15 executing program 3: 18:41:15 executing program 4: [ 892.791344] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 892.791344] 18:41:15 executing program 0: 18:41:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000910", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000005001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:15 executing program 2: 18:41:15 executing program 4: 18:41:15 executing program 3: 18:41:15 executing program 0: 18:41:15 executing program 4: 18:41:15 executing program 2: 18:41:15 executing program 3: 18:41:15 executing program 0: 18:41:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) [ 893.062428] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 893.062428] 18:41:15 executing program 2: 18:41:15 executing program 4: 18:41:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000006001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:15 executing program 3: 18:41:15 executing program 0: 18:41:15 executing program 4: 18:41:15 executing program 2: 18:41:15 executing program 3: 18:41:15 executing program 0: 18:41:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:15 executing program 4: [ 893.304206] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 893.304206] 18:41:15 executing program 0: 18:41:15 executing program 3: 18:41:15 executing program 2: [ 893.420485] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 893.420485] 18:41:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000007001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 4: 18:41:16 executing program 0: 18:41:16 executing program 2: 18:41:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001110", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 3: 18:41:16 executing program 4: 18:41:16 executing program 2: 18:41:16 executing program 3: 18:41:16 executing program 0: 18:41:16 executing program 0: 18:41:16 executing program 3: [ 893.686268] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 893.686268] [ 893.789950] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 893.789950] 18:41:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000009001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001210", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 2: 18:41:16 executing program 4: 18:41:16 executing program 0: 18:41:16 executing program 3: 18:41:16 executing program 4: 18:41:16 executing program 2: 18:41:16 executing program 3: 18:41:16 executing program 2: 18:41:16 executing program 0: 18:41:16 executing program 4: [ 893.996029] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 893.996029] 18:41:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000b001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 0: 18:41:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002210", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 3: 18:41:16 executing program 2: 18:41:16 executing program 4: 18:41:16 executing program 3: 18:41:16 executing program 2: 18:41:16 executing program 0: 18:41:16 executing program 4: 18:41:16 executing program 3: 18:41:16 executing program 0: [ 894.287512] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 894.287512] 18:41:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002310", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:16 executing program 2: 18:41:16 executing program 3: 18:41:16 executing program 4: 18:41:16 executing program 0: 18:41:16 executing program 2: 18:41:16 executing program 4: 18:41:17 executing program 0: 18:41:17 executing program 3: 18:41:17 executing program 4: [ 894.534286] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 894.534286] 18:41:17 executing program 3: 18:41:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000011001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 0: 18:41:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 2: 18:41:17 executing program 3: 18:41:17 executing program 4: 18:41:17 executing program 0: 18:41:17 executing program 2: 18:41:17 executing program 3: [ 894.780527] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 894.780527] 18:41:17 executing program 4: 18:41:17 executing program 2: 18:41:17 executing program 0: 18:41:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000001f001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004810", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 3: 18:41:17 executing program 2: 18:41:17 executing program 4: 18:41:17 executing program 0: 18:41:17 executing program 3: 18:41:17 executing program 2: [ 895.049399] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 895.049399] 18:41:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 4: 18:41:17 executing program 3: 18:41:17 executing program 0: 18:41:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000020001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 2: 18:41:17 executing program 3: 18:41:17 executing program 4: 18:41:17 executing program 0: 18:41:17 executing program 2: 18:41:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006810", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 3: [ 895.288542] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 895.288542] 18:41:17 executing program 2: 18:41:17 executing program 0: 18:41:17 executing program 4: 18:41:17 executing program 3: 18:41:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000022001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:17 executing program 2: 18:41:17 executing program 0: 18:41:18 executing program 4: 18:41:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006c10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:18 executing program 3: 18:41:18 executing program 4: 18:41:18 executing program 2: 18:41:18 executing program 0: 18:41:18 executing program 3: [ 895.631622] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 895.631622] 18:41:18 executing program 4: 18:41:18 executing program 0: 18:41:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000023001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:18 executing program 2: 18:41:18 executing program 3: 18:41:18 executing program 0: 18:41:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007410", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:18 executing program 4: 18:41:18 executing program 3: 18:41:18 executing program 2: 18:41:18 executing program 0: [ 895.899971] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 895.899971] 18:41:18 executing program 4: 18:41:18 executing program 3: 18:41:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000002c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007a10", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:18 executing program 2: 18:41:18 executing program 4: 18:41:18 executing program 0: 18:41:18 executing program 3: [ 896.108785] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 896.108785] 18:41:18 executing program 4: 18:41:18 executing program 2: 18:41:18 executing program 0: 18:41:18 executing program 3: 18:41:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000003f001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:18 executing program 4: 18:41:18 executing program 0: 18:41:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000223", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:18 executing program 2: 18:41:18 executing program 3: 18:41:18 executing program 4: 18:41:18 executing program 2: 18:41:18 executing program 0: 18:41:18 executing program 3: [ 896.445415] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 896.445415] 18:41:19 executing program 0: 18:41:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 4: 18:41:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000040001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 2: 18:41:19 executing program 3: 18:41:19 executing program 0: 18:41:19 executing program 4: 18:41:19 executing program 2: 18:41:19 executing program 3: 18:41:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003f", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: [ 896.705495] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 896.705495] 18:41:19 executing program 2: 18:41:19 executing program 3: 18:41:19 executing program 4: 18:41:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000048001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: 18:41:19 executing program 2: 18:41:19 executing program 3: 18:41:19 executing program 4: 18:41:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: 18:41:19 executing program 2: [ 896.963708] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 896.963708] 18:41:19 executing program 4: 18:41:19 executing program 3: 18:41:19 executing program 4: 18:41:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000004c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: 18:41:19 executing program 2: 18:41:19 executing program 3: 18:41:19 executing program 2: 18:41:19 executing program 4: 18:41:19 executing program 3: 18:41:19 executing program 0: 18:41:19 executing program 0: 18:41:19 executing program 2: [ 897.309859] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 897.309859] 18:41:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 3: 18:41:19 executing program 0: 18:41:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000060001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:19 executing program 4: 18:41:19 executing program 2: 18:41:19 executing program 3: 18:41:20 executing program 4: 18:41:20 executing program 0: 18:41:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000ffff", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:20 executing program 3: 18:41:20 executing program 2: [ 897.581456] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 897.581456] 18:41:20 executing program 0: 18:41:20 executing program 4: 18:41:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000068001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:20 executing program 2: 18:41:20 executing program 3: 18:41:20 executing program 4: 18:41:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000001", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:20 executing program 0: 18:41:20 executing program 2: 18:41:20 executing program 4: 18:41:20 executing program 3: [ 897.876720] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 897.876720] 18:41:20 executing program 0: 18:41:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000006c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:20 executing program 3: 18:41:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000100", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:20 executing program 4: 18:41:20 executing program 2: 18:41:20 executing program 0: 18:41:20 executing program 3: 18:41:20 executing program 4: [ 898.180521] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 898.180521] 18:41:20 executing program 2: 18:41:20 executing program 3: 18:41:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000074001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:20 executing program 0: 18:41:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000001", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:20 executing program 2: 18:41:20 executing program 3: 18:41:20 executing program 4: 18:41:20 executing program 2: 18:41:20 executing program 0: [ 898.482455] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 898.482455] 18:41:21 executing program 3: 18:41:21 executing program 4: 18:41:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000001", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 2: [ 898.584000] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 898.584000] 18:41:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000007a001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 0: 18:41:21 executing program 3: 18:41:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000001", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 4: 18:41:21 executing program 2: 18:41:21 executing program 0: 18:41:21 executing program 3: [ 898.799296] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 898.799296] 18:41:21 executing program 4: 18:41:21 executing program 2: 18:41:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000001", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 0: 18:41:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000fff001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 3: 18:41:21 executing program 4: 18:41:21 executing program 2: 18:41:21 executing program 0: 18:41:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000e0fa", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 4: [ 899.129538] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 899.129538] 18:41:21 executing program 3: 18:41:21 executing program 2: 18:41:21 executing program 0: 18:41:21 executing program 4: 18:41:21 executing program 0: 18:41:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000022300000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 3: 18:41:21 executing program 2: 18:41:21 executing program 0: 18:41:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000020fb", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:21 executing program 4: 18:41:21 executing program 2: 18:41:21 executing program 3: 18:41:22 executing program 4: 18:41:22 executing program 0: 18:41:22 executing program 3: 18:41:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 2: 18:41:22 executing program 4: 18:41:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000100", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 0: 18:41:22 executing program 3: 18:41:22 executing program 4: 18:41:22 executing program 2: 18:41:22 executing program 0: 18:41:22 executing program 2: 18:41:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000002", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 3: 18:41:22 executing program 2: 18:41:22 executing program 4: 18:41:22 executing program 0: 18:41:22 executing program 3: 18:41:22 executing program 0: 18:41:22 executing program 2: 18:41:22 executing program 4: 18:41:22 executing program 0: 18:41:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000008", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 3: 18:41:22 executing program 2: 18:41:22 executing program 4: 18:41:22 executing program 0: 18:41:22 executing program 3: 18:41:22 executing program 2: 18:41:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000006300000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 0: 18:41:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000a", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:22 executing program 4: 18:41:22 executing program 3: 18:41:22 executing program 2: 18:41:22 executing program 0: 18:41:22 executing program 4: 18:41:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000003b100000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:23 executing program 0: 18:41:23 executing program 3: 18:41:23 executing program 0: 18:41:23 executing program 2: 18:41:23 executing program 4: 18:41:23 executing program 0: 18:41:23 executing program 3: 18:41:23 executing program 4: 18:41:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000023", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:23 executing program 2: 18:41:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000ffffffc900000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:23 executing program 3: 18:41:23 executing program 0: 18:41:23 executing program 2: 18:41:23 executing program 4: epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000001bc0)) 18:41:23 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400801, 0x0) 18:41:23 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) 18:41:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:23 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, 0x0) 18:41:23 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x110040, 0x0) 18:41:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000fc00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:23 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x0, 0x0) 18:41:23 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x0) 18:41:23 executing program 3: write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) 18:41:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:23 executing program 4: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x800) 18:41:23 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) 18:41:23 executing program 0: lsetxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 18:41:24 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) write$P9_RLINK(r0, 0x0, 0x0) 18:41:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004000000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self\x00', 0x2000, 0x0) 18:41:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) 18:41:24 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 18:41:24 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000013c0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005680), 0x0, 0x0, 0x0) 18:41:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000000", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 3: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) utimensat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 18:41:24 executing program 0: creat(&(0x7f0000000440)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') 18:41:24 executing program 2: 18:41:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, 0x0) 18:41:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000008000000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 3: open(&(0x7f0000001a40)='./file0\x00', 0x4c87c0, 0x0) 18:41:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') 18:41:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000f", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWALK(r0, 0x0, 0x0) 18:41:24 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x12040, 0x0) fcntl$dupfd(r0, 0x0, r0) 18:41:24 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x0) 18:41:24 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x1c0040, 0x0) 18:41:24 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x3000, 0x0) 18:41:24 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) 18:41:24 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/pid\x00') 18:41:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000bc520100000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x2, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) 18:41:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x20, 0x0) 18:41:24 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 18:41:24 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2280, 0x0) 18:41:24 executing program 3: ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) 18:41:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000c0520100000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x7ffff, 0x8000}], 0x0, &(0x7f0000000040)) 18:41:24 executing program 0: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 18:41:24 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 18:41:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x4f) 18:41:25 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x12040, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0xee01, 0xee00) 18:41:25 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x701000, 0x0) 18:41:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000c4520100000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) fcntl$setflags(r0, 0x2, 0x1) 18:41:25 executing program 4: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) 18:41:25 executing program 3: open$dir(&(0x7f0000000040)='./file0\x00', 0x12040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x600080, 0x0) 18:41:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x4}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x12040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x10c) 18:41:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000c8520100000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 3: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 18:41:25 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x521400, 0x0) 18:41:25 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x4000, 0x0) 18:41:25 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockname(r0, 0x0, 0x0) 18:41:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) 18:41:25 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@abs, 0x6e) 18:41:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='security.evm\x00', 0x0, 0x0, 0x0) 18:41:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000200000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) fsetxattr$security_evm(r0, 0x0, 0x0, 0x0, 0x0) 18:41:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 18:41:25 executing program 2: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 18:41:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x4000}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/null\x00', 0x100, 0x0) 18:41:25 executing program 3: clock_getres(0x2, &(0x7f0000000180)) 18:41:25 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) 18:41:25 executing program 2: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) accept$unix(r0, 0x0, 0x0) 18:41:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000002001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x6000}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 0: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, 0x0) 18:41:25 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x25) 18:41:25 executing program 4: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1011, r0, 0x0) 18:41:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, 0x0) 18:41:25 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40200, 0x0) 18:41:25 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RSETATTR(r1, 0x0, 0x0) [ 903.372309] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 903.372309] 18:41:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 18:41:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x7f00}], 0x0, &(0x7f0000000040)) 18:41:25 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000000)) 18:41:25 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) fcntl$setflags(r0, 0x2, 0x0) 18:41:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000003001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@loopback}, 0x14) 18:41:26 executing program 2: statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 18:41:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='statm\x00') 18:41:26 executing program 0: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, 0x0) 18:41:26 executing program 4: ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 18:41:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8002}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 2: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x28040, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) 18:41:26 executing program 3: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x1000) [ 903.679709] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 903.679709] 18:41:26 executing program 4: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:41:26 executing program 0: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) dup2(r0, r0) 18:41:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000180)='ns/net\x00') 18:41:26 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80400) 18:41:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8003}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2001, 0x0) 18:41:26 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x12040, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4) 18:41:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 18:41:26 executing program 0: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) setxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0) 18:41:26 executing program 3: ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(0xffffffffffffffff, 0x80489439, 0x0) [ 903.922027] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 903.922027] 18:41:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 18:41:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) 18:41:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8004}], 0x0, &(0x7f0000000040)) [ 904.033198] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 904.033198] 18:41:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000005001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000003a40)='/proc/thread-self\x00', 0x400, 0x0) 18:41:26 executing program 3: pipe2(0x0, 0x104000) 18:41:26 executing program 4: sched_getaffinity(0x0, 0x8, &(0x7f0000000280)) 18:41:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETATTR(r0, 0x0, 0x0) 18:41:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) connect$unix(r0, 0x0, 0x0) 18:41:26 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, 0x0) [ 904.210326] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 904.210326] 18:41:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8005}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 4: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) 18:41:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x4cb241af96a197f) 18:41:26 executing program 0: memfd_create(&(0x7f0000000300)='trusted.overlay.upper\x00', 0x2) 18:41:26 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x412040, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.system.Security\x00', 0x0, 0x0, 0x0) 18:41:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000006001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) 18:41:26 executing program 2: setxattr$security_capability(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 18:41:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8006}], 0x0, &(0x7f0000000040)) 18:41:26 executing program 0: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) [ 904.471432] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 904.471432] 18:41:27 executing program 3: statx(0xffffffffffffffff, &(0x7f0000001680)='./file0/file0\x00', 0x0, 0x0, 0x0) 18:41:27 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x8002, 0x0) write$P9_RXATTRWALK(r0, 0x0, 0x0) 18:41:27 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) 18:41:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSETATTR(r0, 0x0, 0x0) 18:41:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000007001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x1f) 18:41:27 executing program 2: unlink(&(0x7f0000000000)='./file0\x00') 18:41:27 executing program 0: open(&(0x7f0000001a40)='./file0\x00', 0x28040, 0x30) 18:41:27 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) write$binfmt_script(r0, 0x0, 0x0) 18:41:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8007}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 4: timer_create(0x6, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000140)) [ 904.719606] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 904.719606] 18:41:27 executing program 2: pipe2(&(0x7f0000001140), 0x800) 18:41:27 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 18:41:27 executing program 3: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 18:41:27 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x200040, 0x40) 18:41:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000008001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8008}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 3: getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/87, 0x57) 18:41:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, 0x0) 18:41:27 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/null\x00', 0x0, 0x0) fsync(r0) 18:41:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) [ 904.950122] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 904.950122] 18:41:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, 0x0) 18:41:27 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x80000, 0x0) 18:41:27 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}}, 0x0) 18:41:27 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') 18:41:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000009001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 3: pipe2$9p(&(0x7f0000000000), 0x80000) 18:41:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8009}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x44, 0x0, 0x0) 18:41:27 executing program 3: write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) 18:41:27 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x2840, 0x222) 18:41:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$CHAR_RAW_SECDISCARD(r0, 0x127d, 0x0) [ 905.204666] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 905.204666] 18:41:27 executing program 3: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 18:41:27 executing program 4: lsetxattr$security_ima(&(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 18:41:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) 18:41:27 executing program 0: timer_create(0x1, 0x0, &(0x7f0000000340)) 18:41:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000b001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 3: pipe2(&(0x7f00000053c0), 0x80000) 18:41:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x800c}], 0x0, &(0x7f0000000040)) 18:41:27 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 18:41:27 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, 0x0) 18:41:27 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) open(&(0x7f0000001a40)='./file0\x00', 0x2000, 0x33) [ 905.449397] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 905.449397] 18:41:28 executing program 3: creat(&(0x7f0000000440)='./file0\x00', 0xa) 18:41:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, 0x0) 18:41:28 executing program 4: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0, 0x0) 18:41:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8010}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 18:41:28 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200001, 0x0) [ 905.674014] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 905.674014] 18:41:28 executing program 4: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, 0x0) 18:41:28 executing program 3: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x208180, 0x4) 18:41:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 18:41:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000010001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 4: r0 = inotify_init1(0x0) flock(r0, 0x0) 18:41:28 executing program 2: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 18:41:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8011}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RFLUSH(r0, 0x0, 0x0) [ 905.927842] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 905.927842] 18:41:28 executing program 0: clock_getres(0x7, &(0x7f00000000c0)) 18:41:28 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) 18:41:28 executing program 4: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1011, 0xffffffffffffffff, 0x0) 18:41:28 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) 18:41:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8012}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000011001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 0: open(&(0x7f0000000100)='./file0\x00', 0x8040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0xc0) 18:41:28 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, 0x0, 0x0) 18:41:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8022}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, 0x0, 0x0, 0x24008105) 18:41:28 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 18:41:28 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) connect$unix(r0, 0x0, 0x0) [ 906.248418] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 906.248418] 18:41:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$unix(r2, 0x0, 0x44000884) 18:41:28 executing program 0: open(&(0x7f0000001a40)='./file0\x00', 0x1010c0, 0x2) 18:41:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 18:41:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000020001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8023}], 0x0, &(0x7f0000000040)) 18:41:28 executing program 0: open$dir(&(0x7f0000000000)='./file1\x00', 0x49a043, 0x14b) 18:41:28 executing program 4: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) setxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='V'], 0x0, 0x0, 0x0) 18:41:28 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 18:41:29 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, 0x0, 0x0, 0x4f, 0x0) 18:41:29 executing program 2: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) [ 906.548037] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 906.548037] 18:41:29 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x80080, 0x0) 18:41:29 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x79, 0x0) 18:41:29 executing program 2: mount$9p_rdma(&(0x7f00000012c0)='127.0.0.1\x00', &(0x7f0000001300)='./file0/file0\x00', &(0x7f0000001340)='9p\x00', 0x888000, 0x0) 18:41:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockname(r0, 0x0, 0x0) 18:41:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x802c}], 0x0, &(0x7f0000000040)) 18:41:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000022001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:29 executing program 3: creat(&(0x7f0000000440)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x181000, 0x0) 18:41:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2020, 0x0) 18:41:29 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x301000, 0x0) 18:41:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000180)) 18:41:29 executing program 0: open(&(0x7f00000003c0)='./file0\x00', 0x22f40, 0x0) [ 906.804951] audit: type=1804 audit(1602355289.275:50): pid=31962 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir815160510/syzkaller.DPnjFv/813/file0" dev="sda1" ino=15991 res=1 [ 906.829898] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 906.829898] 18:41:29 executing program 2: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) 18:41:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2002, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) 18:41:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) futimesat(r0, 0x0, 0x0) 18:41:29 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) 18:41:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8048}], 0x0, &(0x7f0000000040)) [ 906.974053] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 906.974053] 18:41:29 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80000, 0x0) 18:41:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000023001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth0\x00'}) 18:41:29 executing program 2: write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) 18:41:29 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x0) 18:41:29 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x2300c4, 0x40) 18:41:29 executing program 0: creat(&(0x7f0000000440)='./file0\x00', 0x0) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 18:41:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x804c}], 0x0, &(0x7f0000000040)) 18:41:29 executing program 2: renameat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00') 18:41:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, 0x0) [ 907.194035] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 907.194035] 18:41:29 executing program 3: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:41:29 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000002200)='/dev/full\x00', 0x80ec0, 0x0) 18:41:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000180)="1b", 0x1) 18:41:29 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x102) 18:41:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000002c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) 18:41:29 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB='b'], 0x0, 0x0) 18:41:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8068}], 0x0, &(0x7f0000000040)) 18:41:29 executing program 3: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) 18:41:29 executing program 0: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) r1 = geteuid() fchown(r0, r1, 0x0) 18:41:29 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x12040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 907.441215] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 907.441215] 18:41:29 executing program 2: r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, 0x0) 18:41:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000048001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:30 executing program 3: fchownat(0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x400) 18:41:30 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x0, r0) 18:41:30 executing program 4: pipe2(&(0x7f00000000c0), 0x80000) 18:41:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x806c}], 0x0, &(0x7f0000000040)) 18:41:30 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x28040, 0x0) 18:41:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000013c0)={0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000057c0)={0x77359400}) 18:41:30 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) [ 907.679930] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 907.679930] 18:41:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 18:41:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8074}], 0x0, &(0x7f0000000040)) 18:41:30 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) accept(r0, 0x0, 0x0) 18:41:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000004c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:30 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 18:41:30 executing program 0: unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 18:41:30 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x0) 18:41:30 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x0, r1) 18:41:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x807a}], 0x0, &(0x7f0000000040)) 18:41:30 executing program 3: fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) [ 907.957484] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 907.957484] 18:41:30 executing program 0: recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x12002, 0x0, 0x0) 18:41:30 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x127000, 0x0) 18:41:30 executing program 4: r0 = open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 18:41:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 18:41:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000060001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:30 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0xc41, 0x4) 18:41:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2, &(0x7f0000000040)) 18:41:30 executing program 0: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, 0x0) 18:41:30 executing program 3: timerfd_settime(0xffffffffffffffff, 0xdca6eb71f5805db4, 0x0, 0x0) 18:41:30 executing program 4: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 18:41:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000080)) 18:41:30 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RUNLINKAT(r1, 0x0, 0x0) [ 908.223566] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 908.223566] 18:41:30 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 18:41:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x3, &(0x7f0000000040)) 18:41:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000068001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:30 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 18:41:30 executing program 2: eventfd2(0x0, 0x802) 18:41:30 executing program 4: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 18:41:30 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x0) [ 908.434477] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 908.434477] 18:41:30 executing program 0: open(&(0x7f0000001a40)='./file0\x00', 0xa043, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 18:41:31 executing program 4: pipe2(&(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) 18:41:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4, &(0x7f0000000040)) 18:41:31 executing program 2: open$dir(&(0x7f0000000040)='./file0\x00', 0x29e0c0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x0) 18:41:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000006c001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:31 executing program 3: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fcntl$dupfd(r0, 0x0, r1) 18:41:31 executing program 2: accept4(0xffffffffffffffff, 0x0, 0x0, 0x180800) 18:41:31 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0) 18:41:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x5, &(0x7f0000000040)) 18:41:31 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROTATIONAL(r0, 0x127e, 0x0) [ 908.674330] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 908.674330] 18:41:31 executing program 3: open(&(0x7f0000001a40)='./file0\x00', 0x8040, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.apparmor\x00', 0x0, 0x0, 0x0) 18:41:31 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2f2183, 0x0) 18:41:31 executing program 0: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) getpeername(r0, 0x0, 0x0) 18:41:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000074001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:31 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000040)=ANY=[], 0x1f) 18:41:31 executing program 4: pipe2(&(0x7f0000001140)={0xffffffffffffffff}, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) 18:41:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6, &(0x7f0000000040)) 18:41:31 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) 18:41:31 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000a40)='ns/user\x00') [ 908.922309] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 908.922309] 18:41:31 executing program 3: getresgid(&(0x7f0000000900), &(0x7f0000001a80), &(0x7f0000001ac0)) 18:41:31 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x412041, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(r1, r0) 18:41:31 executing program 0: chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 18:41:31 executing program 2: inotify_add_watch(0xffffffffffffffff, 0x0, 0x800) 18:41:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000007a001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7, &(0x7f0000000040)) 18:41:31 executing program 3: lgetxattr(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) 18:41:31 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 18:41:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) 18:41:31 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) [ 909.191539] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 909.191539] 18:41:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0xc0189436, &(0x7f0000001140)={'ip_vti0\x00', &(0x7f0000001100)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote}}}}) 18:41:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0xffffffffffffffb4) 18:41:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x8, &(0x7f0000000040)) 18:41:31 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r0, &(0x7f0000000640), 0x10) 18:41:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000031000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1057a40b45f34ad7, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 18:41:31 executing program 2: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000200)={{0x0, 0x989680}, {r0}}, &(0x7f0000000240)) 18:41:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001140)={'ip_vti0\x00', &(0x7f0000001100)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x5, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote}}}}) 18:41:31 executing program 3: r0 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 18:41:32 executing program 4: setresuid(0x0, 0xee01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}], 0x20}, 0x0) 18:41:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x9, &(0x7f0000000040)) 18:41:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000051000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:32 executing program 2: syz_mount_image$udf(&(0x7f0000001780)='udf\x00', &(0x7f00000017c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002940), 0x0, &(0x7f0000002a80)={[{@novrs='novrs'}, {@gid_ignore='gid=ignore'}, {@umask={'umask'}}]}) 18:41:32 executing program 0: perf_event_open$cgroup(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90f7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:41:32 executing program 3: clone(0x4400100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x128, 0x0, 0x0, 0x0, 0x128, 0x238, 0x210, 0x210, 0x238, 0x210, 0x3, 0x0, {[{{@ipv6={@empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'ip_vti0\x00', 'netpci0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}}, @common=@inet=@tcp={{0x30, 'tcp\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) 18:41:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f00000006c0)={[{@fat=@showexec='showexec'}]}) 18:41:32 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005640)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000001540)=[@pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x28}}], 0x1, 0x0) 18:41:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x75f, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) [ 909.698326] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 909.722094] UDF-fs: Scanning with blocksize 512 failed [ 909.736487] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found 18:41:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000061000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)=ANY=[]) [ 909.765874] x_tables: ip6_tables: tcp match: only valid for protocol 6 [ 909.766754] UDF-fs: Scanning with blocksize 1024 failed [ 909.784665] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 18:41:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001980)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 18:41:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xc, &(0x7f0000000040)) [ 909.822435] x_tables: ip6_tables: tcp match: only valid for protocol 6 [ 909.847538] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 909.855529] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 909.877570] UDF-fs: Scanning with blocksize 2048 failed [ 909.918652] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 909.945129] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 909.968428] UDF-fs: Scanning with blocksize 4096 failed 18:41:32 executing program 4: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) unlinkat(r0, &(0x7f0000000200)='./file3\x00', 0x200) [ 909.989750] UDF-fs: warning (device loop2): udf_fill_super: No partition found (1) 18:41:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) [ 910.179575] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 910.195682] UDF-fs: Scanning with blocksize 512 failed [ 910.222751] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 910.254224] UDF-fs: Scanning with blocksize 1024 failed [ 910.275499] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 910.298662] UDF-fs: Scanning with blocksize 2048 failed [ 910.318049] UDF-fs: warning (device loop2): udf_load_vrs: No anchor found [ 910.346256] UDF-fs: Scanning with blocksize 4096 failed [ 910.380742] UDF-fs: warning (device loop2): udf_fill_super: No partition found (1) 18:41:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002280)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000440)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8}]}]}, 0x28}}, 0x0) 18:41:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000071000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x10, &(0x7f0000000040)) 18:41:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[], 0x23) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x0, 0x0) fsetxattr(r2, &(0x7f0000000680)=@known='user.syz\x00', 0x0, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000240)={"90e20226aa5f66f8ceffbbdee2f4ea5b", 0x0, 0x0, {0x101, 0x769}, {0x1, 0x4}, 0x1, [0x0, 0x3, 0x0, 0x7, 0xffffffff, 0x40, 0x0, 0xfffffffffffffff9, 0x20, 0x1ff, 0x8001, 0x4, 0x0, 0x9, 0x3, 0x2]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f0000000340)={{r0}, 0x0, 0x8, @unused=[0x5, 0xc9a9, 0x0, 0x3], @subvolid=0x8001}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) close(r1) r3 = open(&(0x7f0000002000)='./bus\x00', 0xc4042, 0x0) setsockopt$inet6_int(r1, 0x29, 0x34, &(0x7f0000000000)=0x9, 0x4) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x200004) 18:41:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000091000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) 18:41:33 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 18:41:34 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000600)='/dev/nvram\x00', 0x901, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 18:41:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) [ 911.560713] audit: type=1800 audit(1602355294.025:51): pid=32435 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16031 res=0 18:41:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:34 executing program 3: 18:41:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x11, &(0x7f0000000040)) 18:41:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:34 executing program 3: [ 912.376219] audit: type=1800 audit(1602355294.845:52): pid=32435 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16031 res=0 18:41:34 executing program 4: 18:41:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) setns(0xffffffffffffffff, 0x0) 18:41:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:34 executing program 3: 18:41:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x12, &(0x7f0000000040)) 18:41:35 executing program 2: 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) setns(0xffffffffffffffff, 0x0) 18:41:35 executing program 3: 18:41:35 executing program 4: 18:41:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000111000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:35 executing program 3: 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) setns(0xffffffffffffffff, 0x0) 18:41:35 executing program 2: 18:41:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x22, &(0x7f0000000040)) 18:41:35 executing program 4: 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001f1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:35 executing program 3: 18:41:35 executing program 4: 18:41:35 executing program 2: 18:41:35 executing program 3: 18:41:35 executing program 2: 18:41:35 executing program 4: 18:41:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x23, &(0x7f0000000040)) 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:35 executing program 3: 18:41:35 executing program 2: 18:41:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000201000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:35 executing program 4: 18:41:35 executing program 3: 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2c, &(0x7f0000000040)) 18:41:35 executing program 3: 18:41:35 executing program 2: 18:41:35 executing program 4: 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:35 executing program 2: 18:41:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000221000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:35 executing program 3: 18:41:35 executing program 4: 18:41:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:35 executing program 2: 18:41:35 executing program 4: 18:41:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x48, &(0x7f0000000040)) 18:41:35 executing program 3: 18:41:36 executing program 2: 18:41:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000231000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x2000200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) 18:41:36 executing program 4: 18:41:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4c, &(0x7f0000000040)) 18:41:36 executing program 2: 18:41:36 executing program 3: 18:41:36 executing program 4: 18:41:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x2000200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) 18:41:36 executing program 3: 18:41:36 executing program 2: 18:41:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x60, &(0x7f0000000040)) 18:41:36 executing program 4: 18:41:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x2000200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x0) 18:41:36 executing program 2: 18:41:36 executing program 3: 18:41:36 executing program 4: 18:41:36 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000003f1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:36 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:36 executing program 2: 18:41:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x68, &(0x7f0000000040)) 18:41:36 executing program 4: 18:41:36 executing program 3: 18:41:36 executing program 2: 18:41:36 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:36 executing program 2: 18:41:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000401000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:36 executing program 4: 18:41:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6c, &(0x7f0000000040)) 18:41:36 executing program 2: 18:41:36 executing program 3: 18:41:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:36 executing program 4: 18:41:36 executing program 3: 18:41:36 executing program 2: 18:41:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000481000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:36 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:36 executing program 3: 18:41:36 executing program 4: 18:41:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x74, &(0x7f0000000040)) 18:41:36 executing program 2: 18:41:37 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:37 executing program 3: 18:41:37 executing program 4: 18:41:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7a, &(0x7f0000000040)) 18:41:37 executing program 2: 18:41:37 executing program 3: 18:41:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:37 executing program 4: 18:41:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:37 executing program 3: 18:41:37 executing program 2: 18:41:37 executing program 4: 18:41:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xb0, &(0x7f0000000040)) 18:41:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:37 executing program 2: 18:41:37 executing program 4: 18:41:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:37 executing program 3: 18:41:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x2000200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r1, 0x0) 18:41:37 executing program 2: 18:41:37 executing program 4: 18:41:37 executing program 3: 18:41:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1b0, &(0x7f0000000040)) 18:41:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:37 executing program 2: 18:41:37 executing program 4: 18:41:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000681000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:37 executing program 3: 18:41:37 executing program 4: 18:41:37 executing program 2: 18:41:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x300, &(0x7f0000000040)) 18:41:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:37 executing program 4: 18:41:37 executing program 3: 18:41:37 executing program 2: 18:41:37 executing program 4: 18:41:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:37 executing program 2: 18:41:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000741000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:37 executing program 3: 18:41:37 executing program 4: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:38 executing program 2: 18:41:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x3ee, &(0x7f0000000040)) 18:41:38 executing program 4: 18:41:38 executing program 3: 18:41:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007a1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:38 executing program 2: 18:41:38 executing program 3: 18:41:38 executing program 4: 18:41:38 executing program 3: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r2, 0x0) 18:41:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x500, &(0x7f0000000040)) 18:41:38 executing program 2: 18:41:38 executing program 4: 18:41:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000fff1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:38 executing program 3: 18:41:38 executing program 2: 18:41:38 executing program 4: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, 0x0) setns(r2, 0x0) 18:41:38 executing program 4: 18:41:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x600, &(0x7f0000000040)) 18:41:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000004000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:38 executing program 2: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, 0x0) setns(r2, 0x0) 18:41:38 executing program 3: 18:41:38 executing program 4: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) r2 = syz_open_procfs$namespace(0x0, 0x0) setns(r2, 0x0) 18:41:38 executing program 3: 18:41:38 executing program 2: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(0xffffffffffffffff, 0x0) 18:41:38 executing program 4: 18:41:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x700, &(0x7f0000000040)) 18:41:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000008000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:38 executing program 2: 18:41:38 executing program 3: 18:41:38 executing program 4: 18:41:38 executing program 2: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(0xffffffffffffffff, 0x0) 18:41:38 executing program 3: 18:41:38 executing program 4: 18:41:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000200) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(0xffffffffffffffff, 0x0) 18:41:38 executing program 2: 18:41:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x900, &(0x7f0000000040)) 18:41:39 executing program 4: 18:41:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000000b000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:39 executing program 2: 18:41:39 executing program 3: 18:41:39 executing program 0: 18:41:39 executing program 3: 18:41:39 executing program 4: 18:41:39 executing program 2: 18:41:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xc00, &(0x7f0000000040)) 18:41:39 executing program 0: 18:41:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000fff000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:39 executing program 3: 18:41:39 executing program 2: 18:41:39 executing program 4: 18:41:39 executing program 0: 18:41:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1100, &(0x7f0000000040)) 18:41:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000040000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:39 executing program 3: 18:41:39 executing program 2: 18:41:39 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40841, 0x0) 18:41:39 executing program 0: 18:41:39 executing program 3: 18:41:39 executing program 2: 18:41:39 executing program 0: 18:41:39 executing program 4: 18:41:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1200, &(0x7f0000000040)) 18:41:39 executing program 3: 18:41:39 executing program 2: 18:41:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000080000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:39 executing program 0: 18:41:39 executing program 4: 18:41:39 executing program 3: 18:41:39 executing program 2: 18:41:39 executing program 0: 18:41:39 executing program 4: 18:41:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1f00, &(0x7f0000000040)) 18:41:39 executing program 3: 18:41:39 executing program 4: 18:41:39 executing program 2: 18:41:39 executing program 0: 18:41:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b0000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:40 executing program 3: 18:41:40 executing program 0: 18:41:40 executing program 4: 18:41:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2000, &(0x7f0000000040)) 18:41:40 executing program 2: 18:41:40 executing program 3: 18:41:40 executing program 0: 18:41:40 executing program 4: 18:41:40 executing program 2: 18:41:40 executing program 0: 18:41:40 executing program 3: 18:41:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000100000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2200, &(0x7f0000000040)) 18:41:40 executing program 4: 18:41:40 executing program 3: 18:41:40 executing program 2: 18:41:40 executing program 0: 18:41:40 executing program 2: 18:41:40 executing program 0: 18:41:40 executing program 3: 18:41:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000480000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:40 executing program 2: 18:41:40 executing program 4: 18:41:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2300, &(0x7f0000000040)) 18:41:40 executing program 0: 18:41:40 executing program 4: 18:41:40 executing program 3: 18:41:40 executing program 2: 18:41:40 executing program 4: 18:41:40 executing program 0: 18:41:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2c00, &(0x7f0000000040)) 18:41:40 executing program 3: 18:41:40 executing program 2: 18:41:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000500000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:40 executing program 0: 18:41:40 executing program 4: 18:41:40 executing program 3: 18:41:40 executing program 2: 18:41:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x3f00, &(0x7f0000000040)) 18:41:40 executing program 0: 18:41:40 executing program 4: 18:41:41 executing program 2: 18:41:41 executing program 0: 18:41:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000900000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:41 executing program 4: 18:41:41 executing program 0: 18:41:41 executing program 3: 18:41:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4000, &(0x7f0000000040)) 18:41:41 executing program 2: 18:41:41 executing program 4: 18:41:41 executing program 0: 18:41:41 executing program 3: 18:41:41 executing program 2: 18:41:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000a00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:41 executing program 4: 18:41:41 executing program 0: 18:41:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x40b0, &(0x7f0000000040)) 18:41:41 executing program 3: 18:41:41 executing program 4: 18:41:41 executing program 2: 18:41:41 executing program 0: 18:41:41 executing program 3: 18:41:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000c00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:41 executing program 0: 18:41:41 executing program 2: 18:41:41 executing program 4: 18:41:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4800, &(0x7f0000000040)) 18:41:41 executing program 3: 18:41:41 executing program 0: 18:41:41 executing program 3: 18:41:41 executing program 4: 18:41:41 executing program 2: 18:41:41 executing program 0: 18:41:41 executing program 4: 18:41:41 executing program 0: 18:41:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000d00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:41 executing program 3: 18:41:41 executing program 2: 18:41:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4c00, &(0x7f0000000040)) 18:41:41 executing program 4: 18:41:41 executing program 3: 18:41:41 executing program 0: 18:41:41 executing program 2: 18:41:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:41 executing program 3: 18:41:42 executing program 4: 18:41:42 executing program 0: 18:41:42 executing program 2: 18:41:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6000, &(0x7f0000000040)) 18:41:42 executing program 3: 18:41:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000000080)={'hsr0\x00', @ifru_addrs=@nl=@unspec}) 18:41:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000000)={'batadv_slave_0\x00', @ifru_addrs=@nl=@unspec}) 18:41:42 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) 18:41:42 executing program 3: r0 = add_key$keyring(&(0x7f0000001880)='keyring\x00', &(0x7f00000018c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 18:41:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000021000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6800, &(0x7f0000000040)) 18:41:42 executing program 2: getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f0000002340)) 18:41:42 executing program 0: r0 = openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, 0x0) 18:41:42 executing program 4: r0 = add_key$keyring(&(0x7f0000001880)='keyring\x00', &(0x7f00000018c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r0, 0xd8b) 18:41:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x177, 0x16) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2022, 0x0) 18:41:42 executing program 2: r0 = openat$full(0xffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 18:41:42 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$describe(0x6, r0, 0x0, 0x0) 18:41:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'vlan0\x00', @ifru_addrs=@nl=@unspec}) 18:41:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6c00, &(0x7f0000000040)) 18:41:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000031000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:42 executing program 0: r0 = openat$tun(0xffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000180)=""/147) 18:41:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', @ifru_addrs=@nl=@unspec}) 18:41:42 executing program 4: r0 = getpgrp(0x0) waitid(0x1, r0, 0x0, 0xa1000009, 0x0) [ 920.051566] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:41:42 executing program 0: socketpair(0x6f, 0x0, 0x0, 0x0) 18:41:42 executing program 2: pselect6(0x40, &(0x7f00000015c0), 0x0, &(0x7f0000001640)={0x6}, &(0x7f00000016c0), 0x0) 18:41:42 executing program 3: syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x2482) 18:41:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7400, &(0x7f0000000040)) 18:41:42 executing program 4: pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) read$FUSE(r0, &(0x7f0000000980)={0x2020}, 0x2020) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r1) 18:41:42 executing program 0: r0 = add_key$keyring(&(0x7f0000001880)='keyring\x00', &(0x7f00000018c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r0) 18:41:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000041000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000700)=@filter={'filter\x00', 0xe, 0x4, 0x320, 0xf4, 0x0, 0x1bc, 0x0, 0xf4, 0x284, 0x284, 0x284, 0x284, 0x284, 0x4, 0x0, {[{{@ipv6={@loopback, @ipv4={[], [], @local}, [], [], 'macvtap0\x00', 'caif0\x00'}, 0x0, 0xa4, 0xc8}, @common=@unspec=@STANDARD={0x24}}, {{@ipv6={@loopback, @mcast2}, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa4, 0xc8}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x37c) 18:41:42 executing program 3: add_key(&(0x7f0000000840)='syzkaller\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 18:41:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xe00480f3, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0xef013080, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 18:41:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7a00, &(0x7f0000000040)) 18:41:42 executing program 2: r0 = openat$tun(0xffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$int_out(r0, 0x5460, 0x0) 18:41:42 executing program 3: clock_gettime(0x0, &(0x7f0000001680)) pselect6(0x40, &(0x7f00000015c0), &(0x7f0000001600)={0x4}, &(0x7f0000001640)={0x6}, 0x0, 0x0) 18:41:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000051000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:43 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') io_setup(0x1000, &(0x7f0000000000)) 18:41:43 executing program 2: request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='\\{\'4\x00', 0x0) 18:41:43 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x2, 0xff}, 0x20) 18:41:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xb000, &(0x7f0000000040)) 18:41:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000061000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:43 executing program 2: r0 = add_key$keyring(&(0x7f0000001880)='keyring\x00', &(0x7f00000018c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) 18:41:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x8, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 18:41:43 executing program 3: openat$pfkey(0xffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40200, 0x0) 18:41:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 18:41:43 executing program 3: syz_emit_ethernet(0xa6, &(0x7f0000000000)={@local, @random="e4ba9ce56cc4", @void, {@ipv4={0x800, @gre={{0x15, 0x4, 0x0, 0x0, 0x98, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @dev, {[@cipso={0x86, 0x39, 0x0, [{0x0, 0x6, "c2736c1f"}, {0x0, 0xd, "86916128529bee420865a1"}, {0x0, 0x8, "569eb3711677"}, {0x0, 0x12, "fd36f7f10d654f091a78543a6e5aa941"}, {0x0, 0x6, "0066c28e"}]}, @ra={0x94, 0x4}]}}}}}}, 0x0) 18:41:43 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000001a80)='ns/mnt\x00') fcntl$setstatus(r0, 0x4, 0x42000) 18:41:43 executing program 2: clock_gettime(0x7, &(0x7f0000000140)) 18:41:43 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000040)) 18:41:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xb001, &(0x7f0000000040)) 18:41:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000071000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) accept4$inet(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 18:41:43 executing program 4: socketpair(0x2, 0xa, 0x2, 0x0) 18:41:43 executing program 2: r0 = add_key$keyring(&(0x7f0000001880)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080)="ff06", 0x2, r0) 18:41:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002580)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=[@ip_pktinfo={{0x18, 0x0, 0x8, {r3, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x18}}], 0x1, 0x0) r4 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) 18:41:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xb040, &(0x7f0000000040)) 18:41:44 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 18:41:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000081000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) [ 921.586803] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 18:41:44 executing program 4: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000022c0)=[{&(0x7f0000000000)='&', 0x1}, {0x0}], 0x2, 0x0) 18:41:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f00000000c0)={'vlan0\x00', @ifru_addrs=@nl=@unspec}) 18:41:44 executing program 3: openat$urandom(0xffffff9c, &(0x7f0000000fc0)='/dev/urandom\x00', 0x155000, 0x0) 18:41:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xedc0, &(0x7f0000000040)) 18:41:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000040)={'bond_slave_0\x00', @ifru_addrs=@nl=@unspec}) 18:41:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000091000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:44 executing program 2: r0 = openat$ppp(0xffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000002c0)) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, 0x0) 18:41:49 executing program 0: r0 = openat$ppp(0xffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000002c0)) 18:41:49 executing program 3: r0 = openat$ppp(0xffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000002c0)) ioctl$PPPIOCGIDLE(r0, 0x8008743f, 0x0) 18:41:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xee03, &(0x7f0000000040)) 18:41:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getflags(r0, 0x3) 18:41:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:49 executing program 2: openat$tun(0xffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x41, 0x0) 18:41:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020400091200000029bd7000ffdbdf25050006003c8000000a"], 0x90}}, 0x0) 18:41:49 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/net\x00') 18:41:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) 18:41:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xff0f, &(0x7f0000000040)) 18:41:49 executing program 2: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='rcu_utilization\x00'}, 0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 18:41:49 executing program 3: 18:41:49 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) 18:41:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000006c0)={&(0x7f0000000540), 0xc, &(0x7f0000000680)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000080a00000000000000000000030000010900020073697a310000000050000000000a010400000000000000000700000a08000240000000010800024000000001090001"], 0xf8}}, 0x0) 18:41:49 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) 18:41:49 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast2, @in6=@dev}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xffffff27) 18:41:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x3ffff, &(0x7f0000000040)) 18:41:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000101000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000040001000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14, 0x800) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3f}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={r4, 0xa80, 0x3, [0x8000, 0x2, 0x0]}, 0xe) [ 927.290408] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 18:41:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x40000, &(0x7f0000000040)) 18:41:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0xffff, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 927.344615] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 18:41:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0xe, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:49 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, 0x0, 0x0) 18:41:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) [ 927.464918] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 927.464918] 18:41:50 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, 0x0, 0x0) 18:41:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000111000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:50 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, 0x0, 0x0) 18:41:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x100000, &(0x7f0000000040)) 18:41:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 927.768897] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000221000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:50 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1fffff, &(0x7f0000000040)) 18:41:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:50 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:50 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:50 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:50 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x200000, &(0x7f0000000040)) [ 928.483601] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000231000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) [ 928.811897] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x400000, &(0x7f0000000040)) 18:41:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000002c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) getdents64(r0, 0x0, 0x0) 18:41:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000481000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x600000, &(0x7f0000000040)) [ 929.155562] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:51 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) getdents64(r0, 0x0, 0x0) 18:41:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:51 executing program 0: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 4: socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6b6b6b, &(0x7f0000000040)) 18:41:51 executing program 0: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) [ 929.443274] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:52 executing program 4: socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) getdents64(r0, 0x0, 0x0) 18:41:52 executing program 0: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xb00000, &(0x7f0000000040)) 18:41:52 executing program 2: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 4: socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) [ 929.782378] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000681000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) dup(0xffffffffffffffff) getdents64(r0, 0x0, 0x0) 18:41:52 executing program 2: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1000000, &(0x7f0000000040)) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:52 executing program 2: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006c1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 930.135578] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:52 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) dup(0xffffffffffffffff) getdents64(r0, 0x0, 0x0) 18:41:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1b00000, &(0x7f0000000040)) 18:41:52 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000741000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 930.555111] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:53 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) dup(0xffffffffffffffff) getdents64(r0, 0x0, 0x0) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2000000, &(0x7f0000000040)) 18:41:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007a1000000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x3000000, &(0x7f0000000040)) [ 930.847435] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:41:53 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) getdents64(0xffffffffffffffff, 0x0, 0x0) 18:41:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000022300000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) getdents64(0xffffffffffffffff, 0x0, 0x0) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4000000, &(0x7f0000000040)) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) getdents64(0xffffffffffffffff, 0x0, 0x0) 18:41:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x5000000, &(0x7f0000000040)) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:53 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:53 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6000000, &(0x7f0000000040)) 18:41:54 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 4: socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:54 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:41:54 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:41:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7000000, &(0x7f0000000040)) 18:41:54 executing program 4: socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa]}, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000006300000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x8000000, &(0x7f0000000040)) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:54 executing program 4: socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:54 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0000e8", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x9000000, &(0x7f0000000040)) 18:41:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x20, 0x6, 0x9, 0x8, @empty, @mcast2, 0x8000, 0x8000, 0x3, 0x3}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x140, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xc9, 0x3, "0ac87df7e206274b7518ca5e54885703de06cd1d05358d2e86a695b6520c2f7285fda244648962323707f8b8f6ce4ec0be0784ac2e3246aeb278651786dc78236247fee04c662318c400adc586f3f62e8b2e3386302ba4413e5639773e5db7d037a60f518b839794897a81a8ec1503b929a7bd5acfdfeff208d6fb69eaa179bb5c5decd7f2445363eee5decde1ba66c15c84ea813b8669b1e67a0a379fbbebe6900fb2597c8dede462cc29820a6ddee2d5777089a93f36f58786f5f01102c8976767465f0b"}, @ETHTOOL_A_WOL_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x24000090}, 0x880) recvmsg(r2, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 18:41:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000003b100000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:55 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xc000000, &(0x7f0000000040)) 18:41:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) [ 932.677727] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 932.799210] device bond6 entered promiscuous mode [ 932.811774] IPv6: ADDRCONF(NETDEV_UP): bond6: link is not ready 18:41:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:55 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 932.848460] 8021q: adding VLAN 0 to HW filter on device bond6 18:41:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000ffc900000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:41:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x20, 0x6, 0x9, 0x8, @empty, @mcast2, 0x8000, 0x8000, 0x3, 0x3}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x140, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xc9, 0x3, "0ac87df7e206274b7518ca5e54885703de06cd1d05358d2e86a695b6520c2f7285fda244648962323707f8b8f6ce4ec0be0784ac2e3246aeb278651786dc78236247fee04c662318c400adc586f3f62e8b2e3386302ba4413e5639773e5db7d037a60f518b839794897a81a8ec1503b929a7bd5acfdfeff208d6fb69eaa179bb5c5decd7f2445363eee5decde1ba66c15c84ea813b8669b1e67a0a379fbbebe6900fb2597c8dede462cc29820a6ddee2d5777089a93f36f58786f5f01102c8976767465f0b"}, @ETHTOOL_A_WOL_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x24000090}, 0x880) recvmsg(r2, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 18:41:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x10000000, &(0x7f0000000040)) 18:41:55 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000fc00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:41:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:41:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x11000000, &(0x7f0000000040)) [ 933.661293] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:41:56 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000440)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00', 0x10001}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e20, 0x0, @local, 0xe81}, @in6={0xa, 0x4e24, 0x7f, @private2, 0x80000000}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e20, 0x6, @empty, 0x8}, @in6={0xa, 0x4e24, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xc5e}], 0xcc) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) connect(r1, &(0x7f0000000140)=@ll={0x11, 0x3, r4, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x300, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x850}, 0x8840) sendmsg$can_bcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)={0x1, 0xfb13, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x6f, 0x0, 0x0, 0x0, "97736418b3d1cbf0d539d484c82ad19355a031cae35a694b50708466c7fafbfc178f6fb2333eea38a8385e427d033178e60d21cb4430d5c790fa2197d863b859"}}, 0x80}}, 0x0) 18:41:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) [ 933.818724] device bond7 entered promiscuous mode [ 933.833753] IPv6: ADDRCONF(NETDEV_UP): bond7: link is not ready [ 933.840033] 8021q: adding VLAN 0 to HW filter on device bond7 [ 933.884145] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 934.023385] device bond9 entered promiscuous mode [ 934.045707] IPv6: ADDRCONF(NETDEV_UP): bond9: link is not ready [ 934.072923] 8021q: adding VLAN 0 to HW filter on device bond9 18:41:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x20, 0x6, 0x9, 0x8, @empty, @mcast2, 0x8000, 0x8000, 0x3, 0x3}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x140, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xc9, 0x3, "0ac87df7e206274b7518ca5e54885703de06cd1d05358d2e86a695b6520c2f7285fda244648962323707f8b8f6ce4ec0be0784ac2e3246aeb278651786dc78236247fee04c662318c400adc586f3f62e8b2e3386302ba4413e5639773e5db7d037a60f518b839794897a81a8ec1503b929a7bd5acfdfeff208d6fb69eaa179bb5c5decd7f2445363eee5decde1ba66c15c84ea813b8669b1e67a0a379fbbebe6900fb2597c8dede462cc29820a6ddee2d5777089a93f36f58786f5f01102c8976767465f0b"}, @ETHTOOL_A_WOL_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x24000090}, 0x880) recvmsg(r2, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) 18:41:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000000040c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x17) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmsg$inet(r2, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1}, 0x700) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000100)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0xfd, 0x0}}, 0x10) dup2(r3, r4) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x4000, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0xeab) 18:41:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x12000000, &(0x7f0000000040)) 18:41:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000000080c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 934.542742] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (12 blocks) [ 934.577483] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:41:57 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 934.612145] device bond8 entered promiscuous mode [ 934.617539] IPv6: ADDRCONF(NETDEV_UP): bond8: link is not ready [ 934.625114] 8021q: adding VLAN 0 to HW filter on device bond8 18:41:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1f000000, &(0x7f0000000040)) 18:41:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000200c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 934.836127] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (12 blocks) 18:41:57 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 935.059944] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (12 blocks) 18:41:57 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@local, @local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000600", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:41:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x20000000, &(0x7f0000000040)) 18:41:57 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:57 executing program 2 (fault-call:3 fault-nth:0): r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000152bc0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) [ 935.456035] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (12 blocks) 18:41:58 executing program 0 (fault-call:3 fault-nth:0): r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 935.506051] FAULT_INJECTION: forcing a failure. [ 935.506051] name failslab, interval 1, probability 0, space 0, times 0 [ 935.517603] CPU: 1 PID: 2122 Comm: syz-executor.2 Not tainted 4.19.150-syzkaller #0 [ 935.525434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.534778] Call Trace: [ 935.537376] dump_stack+0x22c/0x33e [ 935.541024] should_fail.cold+0xa/0x2f [ 935.544939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 935.550083] ? find_held_lock+0x2d/0x110 [ 935.554248] ? vmci_ctx_get+0x14f/0x280 [ 935.558238] __should_failslab+0x153/0x1b6 [ 935.559405] FAULT_INJECTION: forcing a failure. [ 935.559405] name failslab, interval 1, probability 0, space 0, times 0 [ 935.562480] should_failslab+0x5/0xf [ 935.562497] __kmalloc+0x6d/0x4f0 [ 935.562513] ? vmci_handle_arr_create+0x63/0x150 [ 935.562542] vmci_handle_arr_create+0x63/0x150 [ 935.590127] vmci_ctx_rcv_notifications_get+0x92/0x1a0 [ 935.595395] ? _copy_from_user+0xd2/0x130 [ 935.599534] vmci_host_unlocked_ioctl+0x17ab/0x1e40 [ 935.604540] ? vmci_host_do_alloc_queuepair.constprop.0+0x400/0x400 [ 935.610936] ? avc_ss_reset+0x170/0x170 [ 935.614895] ? __lock_acquire+0x6ec/0x3ff0 [ 935.619124] ? check_preemption_disabled+0x41/0x2b0 [ 935.624134] ? mark_held_locks+0xf0/0xf0 [ 935.628185] ? lock_acquire+0x170/0x3f0 [ 935.632148] ? __fdget_pos+0xe3/0x100 [ 935.635952] ? vmci_host_do_alloc_queuepair.constprop.0+0x400/0x400 [ 935.642345] do_vfs_ioctl+0xcdb/0x12e0 [ 935.646221] ? selinux_file_ioctl+0x44f/0x5e0 [ 935.650702] ? ioctl_preallocate+0x200/0x200 [ 935.655099] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 935.660539] ? __fget+0x3ad/0x570 [ 935.663984] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 935.668210] ? do_syscall_64+0x207/0x670 [ 935.672523] ? check_preemption_disabled+0x41/0x2b0 [ 935.677536] ksys_ioctl+0x9b/0xc0 [ 935.680984] __x64_sys_ioctl+0x6f/0xb0 [ 935.684876] do_syscall_64+0xf9/0x670 [ 935.688668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.693844] RIP: 0033:0x45de59 [ 935.697034] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 935.715925] RSP: 002b:00007f69614abc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 935.723627] RAX: ffffffffffffffda RBX: 00000000000102c0 RCX: 000000000045de59 [ 935.730882] RDX: 0000000020000000 RSI: 00000000000007a6 RDI: 0000000000000003 [ 935.738135] RBP: 00007f69614abca0 R08: 0000000000000000 R09: 0000000000000000 [ 935.745389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 935.752646] R13: 00007ffe285f0e9f R14: 00007f69614ac9c0 R15: 000000000118bf2c [ 935.760045] CPU: 0 PID: 2126 Comm: syz-executor.0 Not tainted 4.19.150-syzkaller #0 [ 935.767844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.777194] Call Trace: [ 935.779792] dump_stack+0x22c/0x33e [ 935.783435] should_fail.cold+0xa/0x2f [ 935.787334] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 935.792447] ? find_held_lock+0x2d/0x110 [ 935.796637] ? vmci_ctx_get+0x14f/0x280 [ 935.800621] __should_failslab+0x153/0x1b6 [ 935.804864] should_failslab+0x5/0xf [ 935.808572] __kmalloc+0x6d/0x4f0 [ 935.812025] ? vmci_handle_arr_create+0x63/0x150 [ 935.816801] vmci_handle_arr_create+0x63/0x150 [ 935.821395] vmci_ctx_rcv_notifications_get+0x92/0x1a0 [ 935.826670] ? _copy_from_user+0xd2/0x130 [ 935.830803] vmci_host_unlocked_ioctl+0x17ab/0x1e40 [ 935.835825] ? vmci_host_do_alloc_queuepair.constprop.0+0x400/0x400 [ 935.842225] ? avc_ss_reset+0x170/0x170 [ 935.846179] ? __lock_acquire+0x6ec/0x3ff0 [ 935.850412] ? check_preemption_disabled+0x41/0x2b0 [ 935.855427] ? mark_held_locks+0xf0/0xf0 [ 935.859469] ? lock_acquire+0x170/0x3f0 [ 935.863438] ? __fdget_pos+0xe3/0x100 [ 935.867239] ? vmci_host_do_alloc_queuepair.constprop.0+0x400/0x400 [ 935.873632] do_vfs_ioctl+0xcdb/0x12e0 [ 935.877511] ? selinux_file_ioctl+0x44f/0x5e0 [ 935.882000] ? ioctl_preallocate+0x200/0x200 [ 935.886403] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 935.891839] ? __fget+0x3ad/0x570 [ 935.895278] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 935.899494] ? do_syscall_64+0x207/0x670 [ 935.903538] ? check_preemption_disabled+0x41/0x2b0 [ 935.908558] ksys_ioctl+0x9b/0xc0 [ 935.912018] __x64_sys_ioctl+0x6f/0xb0 [ 935.915898] do_syscall_64+0xf9/0x670 [ 935.919697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.924888] RIP: 0033:0x45de59 [ 935.928069] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 935.946962] RSP: 002b:00007f11bf1afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:41:58 executing program 2 (fault-call:3 fault-nth:1): r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 935.954691] RAX: ffffffffffffffda RBX: 00000000000102c0 RCX: 000000000045de59 [ 935.961960] RDX: 0000000020000000 RSI: 00000000000007a6 RDI: 0000000000000003 [ 935.969228] RBP: 00007f11bf1afca0 R08: 0000000000000000 R09: 0000000000000000 [ 935.976487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 935.983741] R13: 00007ffd24d632cf R14: 00007f11bf1b09c0 R15: 000000000118bf2c 18:41:58 executing program 0 (fault-call:3 fault-nth:1): r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x22000000, &(0x7f0000000040)) 18:41:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000152c00c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:58 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x2, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:58 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x79f, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x2, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a0, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x23000000, &(0x7f0000000040)) [ 936.313043] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (12 blocks) 18:41:58 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a4, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:58 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x79f, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a5, &(0x7f0000000000)={{@local}}) 18:41:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000152c40c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2c000000, &(0x7f0000000040)) [ 936.521224] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (12 blocks) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a7, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a0, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a8, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a4, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a9, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7aa, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x2000}], 0x0, &(0x7f0000000040)) 18:41:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x3f000000, &(0x7f0000000040)) 18:41:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000152c80c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7ab, &(0x7f0000000000)={{@local}}) [ 936.826410] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7ac, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a5, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7af, &(0x7f0000000000)={{@local}}) [ 936.901897] EXT4-fs (loop3): get root inode failed [ 936.914253] EXT4-fs (loop3): mount failed 18:41:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:41:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b0, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a7, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x40000000, &(0x7f0000000040)) 18:41:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000200000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:41:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b1, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a8, &(0x7f0000000000)={{@local}}) [ 937.250557] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:41:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x40b00000, &(0x7f0000000040)) 18:41:59 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b2, &(0x7f0000000000)={{@local}}) 18:41:59 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a9, &(0x7f0000000000)={{@local}}) [ 937.344977] EXT4-fs (loop3): get root inode failed [ 937.364808] EXT4-fs (loop3): mount failed 18:42:00 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000400000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b3, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7aa, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x48000000, &(0x7f0000000040)) [ 937.617908] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)) [ 937.658374] EXT4-fs (loop3): get root inode failed 18:42:00 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7ab, &(0x7f0000000000)={{@local}}) [ 937.680204] EXT4-fs (loop3): mount failed 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7cb, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4c000000, &(0x7f0000000040)) 18:42:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000500000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:00 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x4b47, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7ac, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)) 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x4b49, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000900000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x68000000, &(0x7f0000000040)) [ 937.982479] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 938.018820] EXT4-fs (loop3): get root inode failed 18:42:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)) 18:42:00 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7af, &(0x7f0000000000)={{@local}}) [ 938.047543] EXT4-fs (loop3): mount failed 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x541b, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000a00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:00 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:00 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b0, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5421, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:00 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b1, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5450, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6b6b6b00, &(0x7f0000000040)) [ 938.318729] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000c00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 938.373400] EXT4-fs (loop3): get root inode failed [ 938.384350] EXT4-fs (loop3): mount failed 18:42:00 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5451, &(0x7f0000000000)={{@local}}) 18:42:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000040)) 18:42:00 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:00 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b2, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5452, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7b3, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000d00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6c000000, &(0x7f0000000040)) 18:42:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000040)) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5460, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7cb, &(0x7f0000000000)={{@local}}) [ 938.672000] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 938.709346] EXT4-fs (loop3): get root inode failed [ 938.734891] EXT4-fs (loop3): mount failed 18:42:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x74000000, &(0x7f0000000040)) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x40049409, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x4b47, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x40086602, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, &(0x7f0000000040)) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x40087602, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:01 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x4b49, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x4020940d, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7a000000, &(0x7f0000000040)) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x80086601, &(0x7f0000000000)={{@local}}) [ 939.094070] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 939.107939] EXT4-fs (loop3): get root inode failed [ 939.114494] EXT4-fs (loop3): mount failed 18:42:01 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x541b, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x80087601, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, 0x0) 18:42:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc0045878, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5421, &(0x7f0000000000)={{@local}}) 18:42:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, 0x0) 18:42:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x8cffffff, &(0x7f0000000040)) 18:42:01 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc0045878, &(0x7f0000000000)={{@local}}) [ 939.433509] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:01 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5450, &(0x7f0000000000)={{@local}}) 18:42:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005f00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:02 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc0189436, &(0x7f0000000000)={{@local}}) [ 939.502847] EXT4-fs (loop3): get root inode failed [ 939.516172] EXT4-fs (loop3): mount failed 18:42:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x952479f0, &(0x7f0000000040)) 18:42:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, 0x0) 18:42:02 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00), 0x0, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:02 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc020660b, &(0x7f0000000000)={{@local}}) 18:42:02 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5451, &(0x7f0000000000)={{@local}}) 18:42:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000006300000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x97ffffff, &(0x7f0000000040)) 18:42:02 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local=0x300}}) 18:42:02 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5452, &(0x7f0000000000)={{@local}}) 18:42:02 executing program 4 (fault-call:3 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 939.854574] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 939.924972] EXT4-fs (loop3): get root inode failed 18:42:02 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:02 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000c900000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xc0ed0000, &(0x7f0000000040)) [ 939.968396] EXT4-fs (loop3): mount failed [ 939.984482] FAULT_INJECTION: forcing a failure. [ 939.984482] name failslab, interval 1, probability 0, space 0, times 0 18:42:02 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x5460, &(0x7f0000000000)={{@local}}) [ 940.017490] CPU: 0 PID: 2729 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 940.025326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.034715] Call Trace: [ 940.037333] dump_stack+0x22c/0x33e [ 940.040991] should_fail.cold+0xa/0x2f [ 940.044878] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.049977] ? lock_acquire+0x170/0x3f0 [ 940.053948] __should_failslab+0x153/0x1b6 [ 940.058164] should_failslab+0x5/0xf [ 940.061870] __kmalloc+0x2dd/0x4f0 [ 940.065405] ? __se_sys_memfd_create+0xf8/0x440 [ 940.070057] __se_sys_memfd_create+0xf8/0x440 [ 940.074536] ? memfd_file_seals_ptr+0x150/0x150 [ 940.079187] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 940.084539] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 940.089651] ? do_syscall_64+0x21/0x670 [ 940.093636] do_syscall_64+0xf9/0x670 [ 940.097446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.102635] RIP: 0033:0x45de59 [ 940.105820] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.124703] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 940.132400] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 940.139659] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 940.146927] RBP: 0000000000004000 R08: 0000000020000218 R09: 0000000000000000 [ 940.154177] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 940.161437] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:02 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c464", 0xf, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:02 executing program 4 (fault-call:3 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:02 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x10}}) [ 940.265193] FAULT_INJECTION: forcing a failure. [ 940.265193] name failslab, interval 1, probability 0, space 0, times 0 [ 940.309923] CPU: 1 PID: 2742 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 940.317756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.327109] Call Trace: [ 940.329706] dump_stack+0x22c/0x33e [ 940.333343] should_fail.cold+0xa/0x2f [ 940.337238] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.342327] ? lock_acquire+0x170/0x3f0 [ 940.346285] __should_failslab+0x153/0x1b6 [ 940.350514] should_failslab+0x5/0xf [ 940.354278] kmem_cache_alloc+0x2b1/0x4a0 [ 940.358447] ? __alloc_fd+0x2ab/0x590 [ 940.362230] ? shmem_destroy_callback+0xb0/0xb0 [ 940.366878] shmem_alloc_inode+0x18/0x40 [ 940.370919] ? shmem_destroy_callback+0xb0/0xb0 [ 940.375565] alloc_inode+0x5d/0x180 [ 940.379172] new_inode+0x1d/0xf0 [ 940.382519] shmem_get_inode+0x96/0x8d0 [ 940.386516] __shmem_file_setup.part.0+0x7a/0x2b0 [ 940.391375] shmem_file_setup+0x61/0x90 [ 940.395332] __se_sys_memfd_create+0x26b/0x440 [ 940.399899] ? memfd_file_seals_ptr+0x150/0x150 [ 940.404551] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 940.409941] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 940.415049] ? do_syscall_64+0x21/0x670 [ 940.419025] do_syscall_64+0xf9/0x670 [ 940.422812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.427980] RIP: 0033:0x45de59 [ 940.431153] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.450033] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 18:42:02 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x40049409, &(0x7f0000000000)={{@local}}) [ 940.457719] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 940.464966] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 940.472215] RBP: 0000000000004000 R08: 0000000020000218 R09: 0000000000000000 [ 940.479463] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 940.486713] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:03 executing program 4 (fault-call:3 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:03 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x3f00}}) [ 940.563900] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 940.606062] EXT4-fs (loop3): get root inode failed 18:42:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000fc00000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xee030000, &(0x7f0000000040)) [ 940.635363] FAULT_INJECTION: forcing a failure. [ 940.635363] name failslab, interval 1, probability 0, space 0, times 0 [ 940.655674] EXT4-fs (loop3): mount failed 18:42:03 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x40086602, &(0x7f0000000000)={{@local}}) [ 940.690187] CPU: 0 PID: 2769 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 940.698015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.707370] Call Trace: [ 940.709975] dump_stack+0x22c/0x33e [ 940.713617] should_fail.cold+0xa/0x2f [ 940.717519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.722636] ? perf_trace_preemptirq_template+0x314/0x4a0 [ 940.728187] ? kmem_cache_alloc+0x97/0x4a0 [ 940.732447] __should_failslab+0x153/0x1b6 [ 940.736693] should_failslab+0x5/0xf [ 940.740434] kmem_cache_alloc+0x2b1/0x4a0 [ 940.744599] selinux_inode_alloc_security+0xe6/0x2d0 [ 940.749711] security_inode_alloc+0x67/0xc0 [ 940.754039] inode_init_always+0x5a3/0xb70 [ 940.758282] alloc_inode+0x7a/0x180 [ 940.761917] new_inode+0x1d/0xf0 [ 940.765295] shmem_get_inode+0x96/0x8d0 [ 940.769285] __shmem_file_setup.part.0+0x7a/0x2b0 [ 940.774125] shmem_file_setup+0x61/0x90 [ 940.778099] __se_sys_memfd_create+0x26b/0x440 [ 940.782689] ? memfd_file_seals_ptr+0x150/0x150 [ 940.787349] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 940.792717] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 940.797818] ? do_syscall_64+0x21/0x670 [ 940.801797] do_syscall_64+0xf9/0x670 [ 940.805599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.810778] RIP: 0033:0x45de59 [ 940.814016] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.832908] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 18:42:03 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x100000}}) [ 940.840617] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 940.847898] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 940.855162] RBP: 0000000000004000 R08: 0000000020000218 R09: 0000000000000000 [ 940.862424] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 940.869687] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:03 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c464", 0xf, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:03 executing program 4 (fault-call:3 fault-nth:3): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002302000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:03 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x1000000}}) 18:42:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xf0792495, &(0x7f0000000040)) 18:42:03 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x3f000000}}) 18:42:03 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x40087602, &(0x7f0000000000)={{@local}}) [ 941.081816] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 941.114934] FAULT_INJECTION: forcing a failure. [ 941.114934] name failslab, interval 1, probability 0, space 0, times 0 18:42:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000b103000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 941.155732] EXT4-fs (loop3): get root inode failed [ 941.181484] EXT4-fs (loop3): mount failed [ 941.183326] CPU: 1 PID: 2806 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 941.193461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.202817] Call Trace: [ 941.205409] dump_stack+0x22c/0x33e [ 941.209043] should_fail.cold+0xa/0x2f [ 941.212936] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 941.218056] ? lock_acquire+0x170/0x3f0 [ 941.222053] __should_failslab+0x153/0x1b6 [ 941.226298] should_failslab+0x5/0xf [ 941.230020] kmem_cache_alloc+0x2b1/0x4a0 [ 941.234188] __d_alloc+0x2b/0xa20 [ 941.237644] d_alloc_pseudo+0x19/0x70 [ 941.241427] alloc_file_pseudo+0xc6/0x250 [ 941.245557] ? alloc_file+0x510/0x510 [ 941.249338] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 941.254942] ? shmem_get_inode+0x44c/0x8d0 [ 941.259160] __shmem_file_setup.part.0+0x102/0x2b0 [ 941.264073] shmem_file_setup+0x61/0x90 [ 941.268034] __se_sys_memfd_create+0x26b/0x440 [ 941.272602] ? memfd_file_seals_ptr+0x150/0x150 [ 941.277251] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 941.282599] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 941.287684] ? do_syscall_64+0x21/0x670 [ 941.291799] do_syscall_64+0xf9/0x670 [ 941.295593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.300850] RIP: 0033:0x45de59 [ 941.304025] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 941.322956] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 941.330644] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 941.337901] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 941.345160] RBP: 0000000000004000 R08: 0000000020000218 R09: 0000000000000000 [ 941.352415] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 941.359677] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:03 executing program 4 (fault-call:3 fault-nth:4): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xf5ffffff, &(0x7f0000000040)) 18:42:03 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0xfdfdffff}}) 18:42:03 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x4020940d, &(0x7f0000000000)={{@local}}) 18:42:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c464", 0xf, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:04 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0xfffffdfd}}) 18:42:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000000b000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 941.543865] FAULT_INJECTION: forcing a failure. [ 941.543865] name failslab, interval 1, probability 0, space 0, times 0 [ 941.578937] CPU: 0 PID: 2838 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 18:42:04 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x80086601, &(0x7f0000000000)={{@local}}) [ 941.586775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.596133] Call Trace: [ 941.598733] dump_stack+0x22c/0x33e [ 941.602375] should_fail.cold+0xa/0x2f [ 941.606263] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 941.611377] ? lock_acquire+0x170/0x3f0 [ 941.615370] __should_failslab+0x153/0x1b6 [ 941.619619] should_failslab+0x5/0xf [ 941.623342] kmem_cache_alloc+0x2b1/0x4a0 [ 941.627512] __alloc_file+0x21/0x330 [ 941.631240] alloc_empty_file+0x6d/0x170 [ 941.635310] alloc_file+0x93/0x510 [ 941.638867] alloc_file_pseudo+0x165/0x250 [ 941.643115] ? alloc_file+0x510/0x510 [ 941.646936] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 941.652573] ? shmem_get_inode+0x44c/0x8d0 [ 941.656828] __shmem_file_setup.part.0+0x102/0x2b0 [ 941.661767] shmem_file_setup+0x61/0x90 [ 941.665753] __se_sys_memfd_create+0x26b/0x440 [ 941.670343] ? memfd_file_seals_ptr+0x150/0x150 [ 941.675019] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 941.680518] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 941.685733] ? do_syscall_64+0x21/0x670 [ 941.689721] do_syscall_64+0xf9/0x670 [ 941.693535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.698727] RIP: 0033:0x45de59 [ 941.701930] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 941.720835] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 941.728553] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 941.735827] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 941.743882] RBP: 0000000000004000 R08: 0000000020000218 R09: 0000000000000000 [ 941.751278] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 941.758553] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 941.777426] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:04 executing program 4 (fault-call:3 fault-nth:5): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:04 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x80087601, &(0x7f0000000000)={{@local}}) 18:42:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xf6ffffff, &(0x7f0000000040)) 18:42:04 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 941.807538] EXT4-fs (loop3): get root inode failed [ 941.819636] EXT4-fs (loop3): mount failed 18:42:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000048000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f0000", 0x16, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:04 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x10}) [ 941.989134] FAULT_INJECTION: forcing a failure. [ 941.989134] name failslab, interval 1, probability 0, space 0, times 0 [ 942.001654] CPU: 1 PID: 2883 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 942.009574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.018929] Call Trace: [ 942.021532] dump_stack+0x22c/0x33e [ 942.025176] should_fail.cold+0xa/0x2f [ 942.029094] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 942.034215] ? lock_acquire+0x170/0x3f0 [ 942.038213] __should_failslab+0x153/0x1b6 [ 942.042509] should_failslab+0x5/0xf [ 942.046231] kmem_cache_alloc+0x2b1/0x4a0 [ 942.050397] selinux_file_alloc_security+0xe4/0x1c0 [ 942.055423] security_file_alloc+0x40/0x90 [ 942.059673] __alloc_file+0xc9/0x330 [ 942.063399] alloc_empty_file+0x6d/0x170 [ 942.067480] alloc_file+0x93/0x510 [ 942.071051] alloc_file_pseudo+0x165/0x250 [ 942.075316] ? alloc_file+0x510/0x510 [ 942.079132] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 942.084768] ? shmem_get_inode+0x44c/0x8d0 [ 942.089140] __shmem_file_setup.part.0+0x102/0x2b0 [ 942.094172] shmem_file_setup+0x61/0x90 [ 942.098164] __se_sys_memfd_create+0x26b/0x440 [ 942.102762] ? memfd_file_seals_ptr+0x150/0x150 [ 942.107445] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.112820] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 942.117934] ? do_syscall_64+0x21/0x670 [ 942.121928] do_syscall_64+0xf9/0x670 [ 942.125745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.130946] RIP: 0033:0x45de59 [ 942.134145] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 942.153268] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 942.160982] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 942.168260] RDX: 0000000020000218 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 942.175533] RBP: 0000000000004000 R08: 0000000020000218 R09: 0000000000000000 [ 942.182809] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000001 [ 942.190082] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:04 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc0045878, &(0x7f0000000000)={{@local}}) 18:42:04 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x3f00}) [ 942.282160] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000fff000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 942.322715] EXT4-fs (loop3): get root inode failed 18:42:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfbffffff, &(0x7f0000000040)) [ 942.347899] EXT4-fs (loop3): mount failed 18:42:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f0000", 0x16, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:04 executing program 4 (fault-call:3 fault-nth:6): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:04 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc0045878, &(0x7f0000000000)={{@local}}) 18:42:04 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:05 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc0189436, &(0x7f0000000000)={{@local}}) 18:42:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000c9ff000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 942.599290] FAULT_INJECTION: forcing a failure. [ 942.599290] name failslab, interval 1, probability 0, space 0, times 0 [ 942.625784] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 942.643781] CPU: 0 PID: 2925 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 942.651604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.660961] Call Trace: [ 942.663564] dump_stack+0x22c/0x33e [ 942.667210] should_fail.cold+0xa/0x2f [ 942.671123] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 942.676237] ? lock_acquire+0x170/0x3f0 [ 942.680230] __should_failslab+0x153/0x1b6 [ 942.684476] should_failslab+0x5/0xf [ 942.688197] kmem_cache_alloc+0x2b1/0x4a0 [ 942.692358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.697211] getname_flags+0xce/0x590 [ 942.701030] do_sys_open+0x26c/0x520 [ 942.704758] ? filp_open+0x70/0x70 [ 942.708314] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.713691] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 942.718802] ? do_syscall_64+0x21/0x670 [ 942.722790] do_syscall_64+0xf9/0x670 [ 942.726606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.731804] RIP: 0033:0x417951 18:42:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfcfdffff, &(0x7f0000000040)) 18:42:05 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x10}) [ 942.735005] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 942.753910] RSP: 002b:00007fa359855a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 942.761627] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 942.768902] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007fa359855ae0 [ 942.776176] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 942.783461] R10: 0000000000002000 R11: 0000000000000293 R12: 0000000000000001 [ 942.790735] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 [ 942.811505] EXT4-fs (loop3): get root inode failed [ 942.816966] EXT4-fs (loop3): mount failed 18:42:05 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f0000", 0x16, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:05 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0xc020660b, &(0x7f0000000000)={{@local}}) 18:42:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001002000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:05 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x3f00}) 18:42:05 executing program 4 (fault-call:3 fault-nth:7): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfdfdffff, &(0x7f0000000040)) 18:42:05 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 943.071398] FAULT_INJECTION: forcing a failure. [ 943.071398] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 943.083242] CPU: 1 PID: 2975 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 943.091041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.100417] Call Trace: [ 943.103020] dump_stack+0x22c/0x33e [ 943.106668] should_fail.cold+0xa/0x2f [ 943.110570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.115685] ? find_held_lock+0x2d/0x110 [ 943.119759] ? avc_has_perm+0x1d7/0x450 [ 943.123771] __alloc_pages_nodemask+0x256/0x2a60 [ 943.128540] ? mark_held_locks+0xf0/0xf0 [ 943.132614] ? check_preemption_disabled+0x41/0x2b0 [ 943.137659] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 943.142510] ? lock_downgrade+0x750/0x750 [ 943.146651] ? up_write+0x18/0x150 [ 943.150175] ? check_preemption_disabled+0x41/0x2b0 [ 943.155199] ? perf_trace_preemptirq_template+0x314/0x4a0 [ 943.160731] cache_grow_begin+0xa1/0x9b0 [ 943.164782] cache_alloc_refill+0x2aa/0x410 [ 943.169094] kmem_cache_alloc+0x3b4/0x4a0 [ 943.173228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 943.178060] getname_flags+0xce/0x590 [ 943.181849] do_sys_open+0x26c/0x520 [ 943.185549] ? filp_open+0x70/0x70 [ 943.189077] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 943.194424] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 943.199516] ? do_syscall_64+0x21/0x670 [ 943.203480] do_syscall_64+0xf9/0x670 [ 943.207270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.212444] RIP: 0033:0x417951 [ 943.215621] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 943.234506] RSP: 002b:00007fa359855a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 943.242196] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 943.249449] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007fa359855ae0 [ 943.256699] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 943.263956] R10: 0000000000002000 R11: 0000000000000293 R12: 0000000000000001 18:42:05 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local=0x300}}) 18:42:05 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x10}) [ 943.271219] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:05 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x3f00}) 18:42:05 executing program 4 (fault-call:3 fault-nth:8): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 943.342851] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001003000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 943.384104] EXT4-fs (loop3): get root inode failed [ 943.389081] EXT4-fs (loop3): mount failed [ 943.446098] FAULT_INJECTION: forcing a failure. [ 943.446098] name failslab, interval 1, probability 0, space 0, times 0 [ 943.457898] CPU: 0 PID: 3003 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 943.465732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.475089] Call Trace: [ 943.477691] dump_stack+0x22c/0x33e [ 943.481340] should_fail.cold+0xa/0x2f [ 943.485238] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.490357] ? lock_acquire+0x170/0x3f0 18:42:05 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000", 0x1a, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:05 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 943.494348] __should_failslab+0x153/0x1b6 [ 943.498600] should_failslab+0x5/0xf [ 943.502320] kmem_cache_alloc+0x2b1/0x4a0 [ 943.506504] ? __save_stack_trace+0x99/0x100 [ 943.510929] __alloc_file+0x21/0x330 [ 943.514652] alloc_empty_file+0x6d/0x170 [ 943.518715] path_openat+0x12b/0x2e90 [ 943.522521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.527900] ? path_lookupat+0x8d0/0x8d0 [ 943.531959] ? mark_held_locks+0xf0/0xf0 [ 943.536032] ? find_held_lock+0x2d/0x110 [ 943.540086] do_filp_open+0x18c/0x3f0 [ 943.543881] ? may_open_dev+0xf0/0xf0 [ 943.547673] ? find_held_lock+0x2d/0x110 [ 943.551742] ? __alloc_fd+0x2ab/0x590 [ 943.555534] ? lock_downgrade+0x750/0x750 [ 943.559674] ? lock_acquire+0x170/0x3f0 [ 943.563638] ? do_raw_spin_unlock+0x171/0x240 [ 943.568115] ? _raw_spin_unlock+0x29/0x40 [ 943.572257] ? __alloc_fd+0x2ab/0x590 [ 943.576154] do_sys_open+0x3b3/0x520 [ 943.579894] ? filp_open+0x70/0x70 [ 943.583424] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 943.588833] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 943.594020] ? do_syscall_64+0x21/0x670 [ 943.597987] do_syscall_64+0xf9/0x670 [ 943.601784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.606963] RIP: 0033:0x417951 [ 943.610138] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 943.629019] RSP: 002b:00007fa359855a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 943.636900] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 18:42:06 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x100000}) 18:42:06 executing program 4 (fault-call:3 fault-nth:9): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 943.644162] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007fa359855ae0 [ 943.651435] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 943.658719] R10: 0000000000002000 R11: 0000000000000293 R12: 0000000000000001 [ 943.666012] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfdffffff, &(0x7f0000000040)) 18:42:06 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x10}}) [ 943.825657] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 943.847537] EXT4-fs (loop3): get root inode failed [ 943.851694] FAULT_INJECTION: forcing a failure. [ 943.851694] name failslab, interval 1, probability 0, space 0, times 0 [ 943.855013] EXT4-fs (loop3): mount failed 18:42:06 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x1000000}) [ 943.926949] CPU: 1 PID: 3030 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 943.934773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.944146] Call Trace: [ 943.946763] dump_stack+0x22c/0x33e [ 943.950409] should_fail.cold+0xa/0x2f [ 943.954311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.959423] ? lock_acquire+0x170/0x3f0 [ 943.963422] __should_failslab+0x153/0x1b6 [ 943.967662] should_failslab+0x5/0xf [ 943.971379] kmem_cache_alloc+0x2b1/0x4a0 18:42:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001004000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 943.975564] selinux_file_alloc_security+0xe4/0x1c0 [ 943.980591] security_file_alloc+0x40/0x90 [ 943.984835] __alloc_file+0xc9/0x330 [ 943.988547] alloc_empty_file+0x6d/0x170 [ 943.992595] path_openat+0x12b/0x2e90 [ 943.996403] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.001750] ? path_lookupat+0x8d0/0x8d0 [ 944.005793] ? mark_held_locks+0xf0/0xf0 [ 944.009845] ? find_held_lock+0x2d/0x110 [ 944.013886] do_filp_open+0x18c/0x3f0 [ 944.017668] ? may_open_dev+0xf0/0xf0 [ 944.021447] ? find_held_lock+0x2d/0x110 [ 944.025491] ? __alloc_fd+0x2ab/0x590 [ 944.029271] ? lock_downgrade+0x750/0x750 [ 944.033398] ? lock_acquire+0x170/0x3f0 [ 944.037353] ? do_raw_spin_unlock+0x171/0x240 [ 944.041826] ? _raw_spin_unlock+0x29/0x40 [ 944.045971] ? __alloc_fd+0x2ab/0x590 [ 944.049754] do_sys_open+0x3b3/0x520 [ 944.053494] ? filp_open+0x70/0x70 [ 944.057180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 944.062533] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 944.067621] ? do_syscall_64+0x21/0x670 [ 944.071577] do_syscall_64+0xf9/0x670 [ 944.075360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.080536] RIP: 0033:0x417951 [ 944.083723] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 944.102602] RSP: 002b:00007fa359855a20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 944.110287] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000417951 [ 944.117535] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007fa359855ae0 [ 944.124782] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 944.132031] R10: 0000000000002000 R11: 0000000000000293 R12: 0000000000000001 [ 944.139282] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:06 executing program 4 (fault-call:3 fault-nth:10): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:06 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x3f00}}) 18:42:06 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x3f000000}) 18:42:06 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000", 0x1a, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfeffffff, &(0x7f0000000040)) 18:42:06 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x100000}}) [ 944.306935] FAULT_INJECTION: forcing a failure. [ 944.306935] name failslab, interval 1, probability 0, space 0, times 0 [ 944.327968] CPU: 1 PID: 3065 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 944.335778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.345113] Call Trace: [ 944.347687] dump_stack+0x22c/0x33e [ 944.351343] should_fail.cold+0xa/0x2f [ 944.355211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 944.360327] __should_failslab+0x153/0x1b6 [ 944.364541] should_failslab+0x5/0xf [ 944.368233] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 944.372947] ? loop_info64_to_compat+0x5e0/0x5e0 [ 944.377793] ? loop_info64_to_compat+0x5e0/0x5e0 [ 944.382530] __kthread_create_on_node+0xd2/0x410 [ 944.387264] ? kthread_parkme+0xa0/0xa0 [ 944.391221] ? lo_ioctl+0x1bb/0x2200 [ 944.394917] ? __mutex_lock+0x3bd/0x13f0 [ 944.398958] ? lock_downgrade+0x750/0x750 [ 944.403086] ? loop_info64_to_compat+0x5e0/0x5e0 [ 944.407821] kthread_create_on_node+0xbb/0xf0 [ 944.412295] ? __kthread_create_on_node+0x410/0x410 [ 944.417301] ? __fget+0x3ad/0x570 [ 944.420749] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 944.424959] ? __lockdep_init_map+0x100/0x5c0 [ 944.429434] ? __lockdep_init_map+0x100/0x5c0 [ 944.433927] lo_ioctl+0xad3/0x2200 [ 944.437445] ? __kasan_slab_free+0x186/0x1f0 [ 944.441854] ? loop_set_status64+0x110/0x110 [ 944.446331] blkdev_ioctl+0x5cb/0x1a7e [ 944.450197] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.455554] ? blkpg_ioctl+0x9c0/0x9c0 [ 944.459421] ? mark_held_locks+0xf0/0xf0 [ 944.463475] ? find_held_lock+0x2d/0x110 [ 944.467515] ? debug_check_no_obj_freed+0x201/0x482 [ 944.472578] block_ioctl+0xe9/0x130 [ 944.476185] ? blkdev_fallocate+0x3f0/0x3f0 [ 944.480501] do_vfs_ioctl+0xcdb/0x12e0 [ 944.484369] ? selinux_file_ioctl+0x44f/0x5e0 [ 944.488866] ? ioctl_preallocate+0x200/0x200 [ 944.493253] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 944.498683] ? __fget+0x3ad/0x570 [ 944.502120] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 944.506336] ? do_syscall_64+0x207/0x670 [ 944.510380] ? check_preemption_disabled+0x41/0x2b0 [ 944.515384] ksys_ioctl+0x9b/0xc0 [ 944.518816] __x64_sys_ioctl+0x6f/0xb0 [ 944.522684] do_syscall_64+0xf9/0x670 [ 944.526464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.531633] RIP: 0033:0x45dcc7 [ 944.534804] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:42:07 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0xfdfdffff}) [ 944.553684] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 944.561371] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 944.568618] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 944.575865] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 944.583123] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 944.590395] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 [ 944.639253] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 944.666359] EXT4-fs (loop3): get root inode failed 18:42:07 executing program 4 (fault-call:3 fault-nth:11): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001005000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 944.689193] EXT4-fs (loop3): mount failed 18:42:07 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0xfffffdfd}) 18:42:07 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x1000000}}) 18:42:07 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000", 0x1a, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 944.778631] FAULT_INJECTION: forcing a failure. [ 944.778631] name failslab, interval 1, probability 0, space 0, times 0 [ 944.799232] CPU: 1 PID: 3096 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 944.807055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.816411] Call Trace: [ 944.819013] dump_stack+0x22c/0x33e [ 944.822647] should_fail.cold+0xa/0x2f [ 944.826539] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 944.831661] __should_failslab+0x153/0x1b6 [ 944.836225] should_failslab+0x5/0xf [ 944.839945] kmem_cache_alloc+0x2b1/0x4a0 [ 944.844160] __kernfs_new_node+0xd2/0x680 [ 944.848301] ? kernfs_find_ns+0x370/0x370 [ 944.852437] ? kernfs_activate+0x2c/0x1d0 [ 944.856570] ? lock_downgrade+0x750/0x750 [ 944.860709] ? kernfs_add_one+0x51/0x4c0 [ 944.864762] ? ww_mutex_unlock+0x2f0/0x2f0 [ 944.868981] ? __mutex_unlock_slowpath+0xea/0x660 [ 944.873808] kernfs_new_node+0x92/0x120 [ 944.877899] __kernfs_create_file+0x51/0x33f [ 944.882300] sysfs_add_file_mode_ns+0x226/0x540 [ 944.886956] internal_create_group+0x355/0xba0 [ 944.891530] ? sysfs_remove_link_from_group+0x70/0x70 [ 944.896700] ? lock_downgrade+0x750/0x750 [ 944.900836] lo_ioctl+0xf87/0x2200 [ 944.904373] ? loop_set_status64+0x110/0x110 [ 944.908774] blkdev_ioctl+0x5cb/0x1a7e [ 944.912644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.917988] ? blkpg_ioctl+0x9c0/0x9c0 [ 944.921858] ? mark_held_locks+0xf0/0xf0 [ 944.925913] ? find_held_lock+0x2d/0x110 [ 944.929968] ? debug_check_no_obj_freed+0x201/0x482 [ 944.934991] block_ioctl+0xe9/0x130 [ 944.938599] ? blkdev_fallocate+0x3f0/0x3f0 [ 944.942908] do_vfs_ioctl+0xcdb/0x12e0 [ 944.946801] ? selinux_file_ioctl+0x44f/0x5e0 [ 944.951279] ? ioctl_preallocate+0x200/0x200 [ 944.955670] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 944.961146] ? __fget+0x3ad/0x570 [ 944.964587] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 944.968821] ? do_syscall_64+0x207/0x670 [ 944.972875] ? check_preemption_disabled+0x41/0x2b0 [ 944.977891] ksys_ioctl+0x9b/0xc0 [ 944.981329] __x64_sys_ioctl+0x6f/0xb0 [ 944.985207] do_syscall_64+0xf9/0x670 [ 944.988997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.994182] RIP: 0033:0x45dcc7 [ 944.997371] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 945.016270] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:42:07 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000100)={0x5, 0x810, 0x1}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 945.023968] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 945.031219] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 945.038465] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 945.045716] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 945.052965] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:07 executing program 4 (fault-call:3 fault-nth:12): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001006000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xff0f0000, &(0x7f0000000040)) 18:42:07 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x4}) 18:42:07 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x3f000000}}) [ 945.288187] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 945.308864] FAULT_INJECTION: forcing a failure. [ 945.308864] name failslab, interval 1, probability 0, space 0, times 0 [ 945.326049] CPU: 0 PID: 3144 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 945.333874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.343230] Call Trace: [ 945.345830] dump_stack+0x22c/0x33e [ 945.347445] EXT4-fs (loop3): get root inode failed [ 945.349471] should_fail.cold+0xa/0x2f [ 945.354658] EXT4-fs (loop3): mount failed [ 945.358307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 945.358336] __should_failslab+0x153/0x1b6 [ 945.358352] should_failslab+0x5/0xf [ 945.358371] kmem_cache_alloc+0x2b1/0x4a0 [ 945.379611] __kernfs_new_node+0xd2/0x680 [ 945.383761] ? kernfs_find_ns+0x370/0x370 [ 945.387889] ? kernfs_activate+0x2c/0x1d0 [ 945.392034] ? lock_downgrade+0x750/0x750 [ 945.396174] ? kernfs_add_one+0x51/0x4c0 [ 945.400216] ? ww_mutex_unlock+0x2f0/0x2f0 [ 945.404447] ? __mutex_unlock_slowpath+0xea/0x660 [ 945.409273] kernfs_new_node+0x92/0x120 [ 945.413242] __kernfs_create_file+0x51/0x33f [ 945.417646] sysfs_add_file_mode_ns+0x226/0x540 [ 945.422307] internal_create_group+0x355/0xba0 [ 945.426878] ? sysfs_remove_link_from_group+0x70/0x70 [ 945.432047] ? lock_downgrade+0x750/0x750 [ 945.436182] lo_ioctl+0xf87/0x2200 [ 945.439708] ? loop_set_status64+0x110/0x110 [ 945.444099] blkdev_ioctl+0x5cb/0x1a7e [ 945.447977] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.453333] ? blkpg_ioctl+0x9c0/0x9c0 [ 945.457214] ? mark_held_locks+0xf0/0xf0 [ 945.461270] ? find_held_lock+0x2d/0x110 [ 945.465314] ? debug_check_no_obj_freed+0x201/0x482 [ 945.470334] block_ioctl+0xe9/0x130 [ 945.473942] ? blkdev_fallocate+0x3f0/0x3f0 [ 945.478248] do_vfs_ioctl+0xcdb/0x12e0 [ 945.482119] ? selinux_file_ioctl+0x44f/0x5e0 [ 945.486594] ? ioctl_preallocate+0x200/0x200 [ 945.491000] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 945.496451] ? __fget+0x3ad/0x570 [ 945.499896] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 945.504129] ? do_syscall_64+0x207/0x670 [ 945.508180] ? check_preemption_disabled+0x41/0x2b0 [ 945.513199] ksys_ioctl+0x9b/0xc0 [ 945.516648] __x64_sys_ioctl+0x6f/0xb0 [ 945.520533] do_syscall_64+0xf9/0x670 [ 945.524321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.529504] RIP: 0033:0x45dcc7 [ 945.532692] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 945.551595] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 945.559308] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 945.566586] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 945.573851] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 945.581122] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 945.588392] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:08 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0xfdfdffff}}) 18:42:08 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f0000000000000400", 0x1c, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:08 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) iopl(0xe7) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000180)=0xb0000) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x541000, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:08 executing program 4 (fault-call:3 fault-nth:13): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffff0300, &(0x7f0000000040)) 18:42:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001007000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:08 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0xfffffdfd}}) [ 945.769720] Unknown ioctl 1959 [ 945.832776] Unknown ioctl 1959 [ 945.878069] FAULT_INJECTION: forcing a failure. [ 945.878069] name failslab, interval 1, probability 0, space 0, times 0 [ 945.895895] CPU: 1 PID: 3191 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 945.903712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.913056] Call Trace: [ 945.915627] dump_stack+0x22c/0x33e [ 945.919245] should_fail.cold+0xa/0x2f [ 945.923274] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 945.928370] __should_failslab+0x153/0x1b6 [ 945.932634] should_failslab+0x5/0xf [ 945.936367] kmem_cache_alloc+0x2b1/0x4a0 [ 945.940525] __kernfs_new_node+0xd2/0x680 [ 945.944747] ? kernfs_find_ns+0x370/0x370 [ 945.948878] ? __mutex_unlock_slowpath+0xea/0x660 [ 945.953704] ? __mutex_add_waiter+0x160/0x160 [ 945.958189] ? kernfs_next_descendant_post+0x19c/0x290 [ 945.963449] kernfs_new_node+0x92/0x120 [ 945.967418] __kernfs_create_file+0x51/0x33f [ 945.971848] sysfs_add_file_mode_ns+0x226/0x540 [ 945.976521] internal_create_group+0x355/0xba0 [ 945.981092] ? sysfs_remove_link_from_group+0x70/0x70 [ 945.986260] ? lock_downgrade+0x750/0x750 [ 945.990396] lo_ioctl+0xf87/0x2200 [ 945.993964] ? loop_set_status64+0x110/0x110 [ 945.998353] blkdev_ioctl+0x5cb/0x1a7e [ 946.002221] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.007577] ? blkpg_ioctl+0x9c0/0x9c0 [ 946.011508] ? mark_held_locks+0xf0/0xf0 [ 946.015551] ? find_held_lock+0x2d/0x110 [ 946.019594] ? debug_check_no_obj_freed+0x201/0x482 [ 946.024597] block_ioctl+0xe9/0x130 [ 946.028206] ? blkdev_fallocate+0x3f0/0x3f0 [ 946.032514] do_vfs_ioctl+0xcdb/0x12e0 [ 946.036384] ? selinux_file_ioctl+0x44f/0x5e0 [ 946.040859] ? ioctl_preallocate+0x200/0x200 [ 946.045249] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 946.050698] ? __fget+0x3ad/0x570 [ 946.054147] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 946.058363] ? do_syscall_64+0x207/0x670 [ 946.062405] ? check_preemption_disabled+0x41/0x2b0 [ 946.067556] ksys_ioctl+0x9b/0xc0 [ 946.071004] __x64_sys_ioctl+0x6f/0xb0 [ 946.074893] do_syscall_64+0xf9/0x670 [ 946.078676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.083856] RIP: 0033:0x45dcc7 [ 946.087039] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 946.105921] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 946.113606] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 946.120854] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 18:42:08 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:08 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$SIOCAX25DELFWD(0xffffffffffffffff, 0x89eb, &(0x7f0000000100)={@default, @null}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 946.128102] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 946.135352] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 946.142598] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x9e5c, 0x1, 0x80, 0x80000001}, {0x81, 0x1, 0x40, 0x4}]}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:08 executing program 4 (fault-call:3 fault-nth:14): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffff1f00, &(0x7f0000000040)) [ 946.283019] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 946.301581] EXT4-fs (loop3): mount failed 18:42:08 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x5, 0x2, 0x8, 0x1, 0x8}) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000040)={0xb1a1, 0x5, [0x0, 0x200, 0x3, 0x0, 0xafb], 0xfeff}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:08 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f0000000000000400", 0x1c, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001008000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:08 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x10}) [ 946.407588] FAULT_INJECTION: forcing a failure. [ 946.407588] name failslab, interval 1, probability 0, space 0, times 0 [ 946.436707] CPU: 1 PID: 3234 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 946.444532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.453879] Call Trace: [ 946.456453] dump_stack+0x22c/0x33e [ 946.460069] should_fail.cold+0xa/0x2f [ 946.463940] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 946.469047] __should_failslab+0x153/0x1b6 [ 946.473292] should_failslab+0x5/0xf [ 946.476986] kmem_cache_alloc+0x2b1/0x4a0 [ 946.481118] __kernfs_new_node+0xd2/0x680 [ 946.485247] ? kernfs_find_ns+0x370/0x370 [ 946.489377] ? __mutex_unlock_slowpath+0xea/0x660 [ 946.494200] ? __mutex_add_waiter+0x160/0x160 [ 946.498675] ? kernfs_next_descendant_post+0x19c/0x290 [ 946.503951] kernfs_new_node+0x92/0x120 [ 946.507942] __kernfs_create_file+0x51/0x33f [ 946.512343] sysfs_add_file_mode_ns+0x226/0x540 [ 946.516998] internal_create_group+0x355/0xba0 [ 946.521567] ? sysfs_remove_link_from_group+0x70/0x70 [ 946.526735] ? lock_downgrade+0x750/0x750 [ 946.530871] lo_ioctl+0xf87/0x2200 [ 946.534394] ? loop_set_status64+0x110/0x110 [ 946.538781] blkdev_ioctl+0x5cb/0x1a7e [ 946.542651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.548008] ? blkpg_ioctl+0x9c0/0x9c0 [ 946.551901] ? mark_held_locks+0xf0/0xf0 [ 946.555956] ? find_held_lock+0x2d/0x110 [ 946.559999] ? debug_check_no_obj_freed+0x201/0x482 [ 946.565003] block_ioctl+0xe9/0x130 [ 946.568609] ? blkdev_fallocate+0x3f0/0x3f0 [ 946.572910] do_vfs_ioctl+0xcdb/0x12e0 [ 946.576801] ? selinux_file_ioctl+0x44f/0x5e0 [ 946.581302] ? ioctl_preallocate+0x200/0x200 [ 946.585713] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 946.591156] ? __fget+0x3ad/0x570 [ 946.594618] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 946.599023] ? do_syscall_64+0x207/0x670 [ 946.603075] ? check_preemption_disabled+0x41/0x2b0 [ 946.608077] ksys_ioctl+0x9b/0xc0 [ 946.611513] __x64_sys_ioctl+0x6f/0xb0 [ 946.615381] do_syscall_64+0xf9/0x670 [ 946.619169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.624349] RIP: 0033:0x45dcc7 [ 946.627533] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 946.646414] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 946.654111] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 946.661361] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 946.668611] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 946.675857] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 946.683106] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:09 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@ax25={{0x3, @bcast}, [@bcast, @netrom, @bcast, @remote, @rose, @remote, @bcast, @netrom]}, &(0x7f0000000180)=0x80) shutdown(r1, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f00000001c0)) 18:42:09 executing program 4 (fault-call:3 fault-nth:15): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 946.830364] EXT4-fs (loop3): corrupt root inode, run e2fsck 18:42:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfffffdfc, &(0x7f0000000040)) 18:42:09 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x3f00}) 18:42:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001009000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 946.876538] EXT4-fs (loop3): mount failed 18:42:09 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x82, 0x0) ioctl$SNDCTL_TMR_TIMEBASE(r3, 0xc0045401, &(0x7f0000000240)=0x35e) dup2(r1, r2) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a5, &(0x7f0000000140)={{@any, 0x7fff}, 0x0, 0x2, 0x5}) r4 = signalfd4(r2, &(0x7f00000000c0)={[0x9]}, 0x8, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r4, 0x7a0, &(0x7f0000000280)={@my=0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)=0x14) [ 946.911131] FAULT_INJECTION: forcing a failure. [ 946.911131] name failslab, interval 1, probability 0, space 0, times 0 [ 946.955980] CPU: 0 PID: 3279 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 946.963799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.973153] Call Trace: [ 946.975752] dump_stack+0x22c/0x33e [ 946.979390] should_fail.cold+0xa/0x2f [ 946.983288] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 946.988405] __should_failslab+0x153/0x1b6 [ 946.992656] should_failslab+0x5/0xf [ 946.996372] kmem_cache_alloc+0x2b1/0x4a0 [ 947.000527] __kernfs_new_node+0xd2/0x680 18:42:09 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000140)={0x3, r3}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_VERSION(r1, 0x79f, &(0x7f00000001c0)=0x10000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 947.004683] ? kernfs_find_ns+0x370/0x370 [ 947.008841] ? __mutex_unlock_slowpath+0xea/0x660 [ 947.013697] ? __mutex_add_waiter+0x160/0x160 [ 947.018199] ? kernfs_next_descendant_post+0x19c/0x290 [ 947.023510] kernfs_new_node+0x92/0x120 [ 947.027493] __kernfs_create_file+0x51/0x33f [ 947.031913] sysfs_add_file_mode_ns+0x226/0x540 [ 947.036603] internal_create_group+0x355/0xba0 [ 947.041188] ? sysfs_remove_link_from_group+0x70/0x70 [ 947.046380] ? lock_downgrade+0x750/0x750 [ 947.050540] lo_ioctl+0xf87/0x2200 [ 947.054069] ? loop_set_status64+0x110/0x110 [ 947.058461] blkdev_ioctl+0x5cb/0x1a7e [ 947.062345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.067704] ? blkpg_ioctl+0x9c0/0x9c0 [ 947.071590] ? mark_held_locks+0xf0/0xf0 [ 947.075733] ? find_held_lock+0x2d/0x110 [ 947.079793] ? debug_check_no_obj_freed+0x201/0x482 [ 947.084830] block_ioctl+0xe9/0x130 [ 947.088461] ? blkdev_fallocate+0x3f0/0x3f0 [ 947.092779] do_vfs_ioctl+0xcdb/0x12e0 [ 947.096651] ? selinux_file_ioctl+0x44f/0x5e0 [ 947.101140] ? ioctl_preallocate+0x200/0x200 [ 947.105553] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 947.111012] ? __fget+0x3ad/0x570 [ 947.114461] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 947.118684] ? do_syscall_64+0x207/0x670 [ 947.122743] ? check_preemption_disabled+0x41/0x2b0 [ 947.127756] ksys_ioctl+0x9b/0xc0 [ 947.131206] __x64_sys_ioctl+0x6f/0xb0 [ 947.135112] do_syscall_64+0xf9/0x670 [ 947.138908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.144091] RIP: 0033:0x45dcc7 [ 947.147275] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 947.166166] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 947.174056] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 947.181325] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 947.188593] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 947.195853] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 947.203112] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:09 executing program 4 (fault-call:3 fault-nth:16): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:09 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f0000000000000400", 0x1c, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:09 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)) 18:42:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfffffdfd, &(0x7f0000000040)) 18:42:09 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:09 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 947.411886] FAULT_INJECTION: forcing a failure. [ 947.411886] name failslab, interval 1, probability 0, space 0, times 0 [ 947.434467] CPU: 0 PID: 3307 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 947.442369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.451807] Call Trace: [ 947.454402] dump_stack+0x22c/0x33e [ 947.458044] should_fail.cold+0xa/0x2f 18:42:09 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x10}) [ 947.461950] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 947.467071] __should_failslab+0x153/0x1b6 [ 947.471325] should_failslab+0x5/0xf [ 947.475043] kmem_cache_alloc+0x2b1/0x4a0 [ 947.479203] __kernfs_new_node+0xd2/0x680 [ 947.483356] ? kernfs_find_ns+0x370/0x370 [ 947.487516] ? __mutex_unlock_slowpath+0xea/0x660 [ 947.492377] ? __mutex_add_waiter+0x160/0x160 [ 947.496881] ? kernfs_next_descendant_post+0x19c/0x290 [ 947.502180] kernfs_new_node+0x92/0x120 [ 947.506636] __kernfs_create_file+0x51/0x33f [ 947.506653] sysfs_add_file_mode_ns+0x226/0x540 [ 947.506675] internal_create_group+0x355/0xba0 [ 947.520280] ? sysfs_remove_link_from_group+0x70/0x70 [ 947.525451] ? lock_downgrade+0x750/0x750 [ 947.529611] lo_ioctl+0xf87/0x2200 [ 947.533162] ? loop_set_status64+0x110/0x110 [ 947.537565] blkdev_ioctl+0x5cb/0x1a7e [ 947.541450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.546822] ? blkpg_ioctl+0x9c0/0x9c0 [ 947.550700] ? mark_held_locks+0xf0/0xf0 [ 947.554751] ? find_held_lock+0x2d/0x110 [ 947.558795] ? debug_check_no_obj_freed+0x201/0x482 [ 947.563799] block_ioctl+0xe9/0x130 [ 947.567408] ? blkdev_fallocate+0x3f0/0x3f0 [ 947.571732] do_vfs_ioctl+0xcdb/0x12e0 [ 947.575612] ? selinux_file_ioctl+0x44f/0x5e0 [ 947.580087] ? ioctl_preallocate+0x200/0x200 [ 947.584484] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 947.589936] ? __fget+0x3ad/0x570 [ 947.593399] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 947.597689] ? do_syscall_64+0x207/0x670 [ 947.601757] ? check_preemption_disabled+0x41/0x2b0 [ 947.606767] ksys_ioctl+0x9b/0xc0 [ 947.610200] __x64_sys_ioctl+0x6f/0xb0 [ 947.614072] do_syscall_64+0xf9/0x670 [ 947.617965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.623144] RIP: 0033:0x45dcc7 [ 947.626332] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 947.645212] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 947.652911] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 18:42:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100b000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 947.660174] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 947.667425] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 947.674683] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 947.681941] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:10 executing program 0: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040)='NLBL_CIPSOv4\x00') 18:42:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffff7f, &(0x7f0000000040)) 18:42:10 executing program 4 (fault-call:3 fault-nth:17): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 947.805418] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 947.821289] EXT4-fs (loop3): mount failed 18:42:10 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x3f00}) 18:42:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 948.005858] FAULT_INJECTION: forcing a failure. [ 948.005858] name failslab, interval 1, probability 0, space 0, times 0 [ 948.025475] CPU: 0 PID: 3351 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 948.033288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.042636] Call Trace: [ 948.045233] dump_stack+0x22c/0x33e [ 948.048894] should_fail.cold+0xa/0x2f [ 948.052790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.057908] __should_failslab+0x153/0x1b6 [ 948.062151] should_failslab+0x5/0xf [ 948.065877] kmem_cache_alloc+0x2b1/0x4a0 [ 948.070033] __kernfs_new_node+0xd2/0x680 [ 948.074207] ? kernfs_find_ns+0x370/0x370 [ 948.078367] ? __mutex_unlock_slowpath+0xea/0x660 [ 948.083224] ? __mutex_add_waiter+0x160/0x160 [ 948.087728] ? kernfs_next_descendant_post+0x19c/0x290 [ 948.093015] kernfs_new_node+0x92/0x120 [ 948.096999] __kernfs_create_file+0x51/0x33f [ 948.101425] sysfs_add_file_mode_ns+0x226/0x540 [ 948.106122] internal_create_group+0x355/0xba0 [ 948.110720] ? sysfs_remove_link_from_group+0x70/0x70 [ 948.115913] ? lock_downgrade+0x750/0x750 [ 948.120090] lo_ioctl+0xf87/0x2200 [ 948.123644] ? loop_set_status64+0x110/0x110 [ 948.128063] blkdev_ioctl+0x5cb/0x1a7e [ 948.131963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.137332] ? blkpg_ioctl+0x9c0/0x9c0 [ 948.141230] ? mark_held_locks+0xf0/0xf0 [ 948.145300] ? find_held_lock+0x2d/0x110 [ 948.149367] ? debug_check_no_obj_freed+0x201/0x482 [ 948.154398] block_ioctl+0xe9/0x130 [ 948.158030] ? blkdev_fallocate+0x3f0/0x3f0 [ 948.162362] do_vfs_ioctl+0xcdb/0x12e0 [ 948.166259] ? selinux_file_ioctl+0x44f/0x5e0 [ 948.170765] ? ioctl_preallocate+0x200/0x200 [ 948.175183] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 948.180643] ? __fget+0x3ad/0x570 [ 948.184106] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 948.188349] ? do_syscall_64+0x207/0x670 [ 948.192420] ? check_preemption_disabled+0x41/0x2b0 [ 948.197451] ksys_ioctl+0x9b/0xc0 [ 948.200915] __x64_sys_ioctl+0x6f/0xb0 [ 948.204810] do_syscall_64+0xf9/0x670 [ 948.208635] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.213822] RIP: 0033:0x45dcc7 [ 948.217023] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.235924] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.243636] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 18:42:10 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100c000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 948.250912] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 948.258183] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 948.265454] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 948.272730] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffff8c, &(0x7f0000000040)) [ 948.384930] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:10 executing program 4 (fault-call:3 fault-nth:18): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 948.433439] EXT4-fs (loop3): get root inode failed 18:42:10 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x10}) [ 948.454957] EXT4-fs (loop3): mount failed 18:42:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001010000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:11 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x3f00}) 18:42:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffff97, &(0x7f0000000040)) [ 948.575372] FAULT_INJECTION: forcing a failure. [ 948.575372] name failslab, interval 1, probability 0, space 0, times 0 [ 948.596916] CPU: 1 PID: 3391 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 948.604731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.614080] Call Trace: [ 948.616655] dump_stack+0x22c/0x33e [ 948.620309] should_fail.cold+0xa/0x2f [ 948.624181] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.629323] ? device_get_ownership+0xa0/0xa0 [ 948.633800] __should_failslab+0x153/0x1b6 [ 948.638029] should_failslab+0x5/0xf [ 948.641856] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 948.646510] ? device_get_ownership+0xa0/0xa0 [ 948.650988] kobject_uevent_env+0x255/0x1390 [ 948.655390] lo_ioctl+0x1002/0x2200 [ 948.658999] ? loop_set_status64+0x110/0x110 [ 948.663395] blkdev_ioctl+0x5cb/0x1a7e [ 948.667274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.672630] ? blkpg_ioctl+0x9c0/0x9c0 [ 948.676499] ? mark_held_locks+0xf0/0xf0 [ 948.680542] ? find_held_lock+0x2d/0x110 [ 948.684586] ? debug_check_no_obj_freed+0x201/0x482 [ 948.689597] block_ioctl+0xe9/0x130 [ 948.693226] ? blkdev_fallocate+0x3f0/0x3f0 [ 948.697536] do_vfs_ioctl+0xcdb/0x12e0 [ 948.701405] ? selinux_file_ioctl+0x44f/0x5e0 [ 948.705881] ? ioctl_preallocate+0x200/0x200 [ 948.710272] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 948.715724] ? __fget+0x3ad/0x570 [ 948.719159] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 948.723378] ? do_syscall_64+0x207/0x670 [ 948.727422] ? check_preemption_disabled+0x41/0x2b0 [ 948.732423] ksys_ioctl+0x9b/0xc0 [ 948.735987] __x64_sys_ioctl+0x6f/0xb0 [ 948.739860] do_syscall_64+0xf9/0x670 [ 948.743653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.748844] RIP: 0033:0x45dcc7 [ 948.752066] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.770950] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 948.778647] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 948.785897] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 948.793160] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 948.800420] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 948.807815] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:11 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x100000}) 18:42:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfffffff5, &(0x7f0000000040)) 18:42:11 executing program 4 (fault-call:3 fault-nth:19): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 949.008564] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 949.061983] EXT4-fs (loop3): get root inode failed [ 949.082268] EXT4-fs (loop3): mount failed 18:42:11 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x1000000}) 18:42:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001011000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 949.231568] FAULT_INJECTION: forcing a failure. [ 949.231568] name failslab, interval 1, probability 0, space 0, times 0 [ 949.255724] CPU: 0 PID: 3431 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 949.263554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.272910] Call Trace: [ 949.275514] dump_stack+0x22c/0x33e [ 949.279155] should_fail.cold+0xa/0x2f [ 949.283054] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.288179] __should_failslab+0x153/0x1b6 [ 949.292534] should_failslab+0x5/0xf [ 949.296256] __kmalloc+0x2dd/0x4f0 [ 949.299803] ? kobject_get_path+0xc1/0x1c0 [ 949.304051] kobject_get_path+0xc1/0x1c0 [ 949.308127] kobject_uevent_env+0x27a/0x1390 [ 949.312562] lo_ioctl+0x1002/0x2200 [ 949.316202] ? loop_set_status64+0x110/0x110 [ 949.320618] blkdev_ioctl+0x5cb/0x1a7e [ 949.324514] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.329882] ? blkpg_ioctl+0x9c0/0x9c0 [ 949.333780] ? mark_held_locks+0xf0/0xf0 [ 949.337847] ? find_held_lock+0x2d/0x110 [ 949.341921] ? debug_check_no_obj_freed+0x201/0x482 [ 949.346960] block_ioctl+0xe9/0x130 [ 949.350592] ? blkdev_fallocate+0x3f0/0x3f0 [ 949.354930] do_vfs_ioctl+0xcdb/0x12e0 [ 949.358832] ? selinux_file_ioctl+0x44f/0x5e0 [ 949.363335] ? ioctl_preallocate+0x200/0x200 [ 949.367783] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 949.373244] ? __fget+0x3ad/0x570 [ 949.376709] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 949.380953] ? do_syscall_64+0x207/0x670 [ 949.385021] ? check_preemption_disabled+0x41/0x2b0 [ 949.390050] ksys_ioctl+0x9b/0xc0 [ 949.393513] __x64_sys_ioctl+0x6f/0xb0 [ 949.397405] do_syscall_64+0xf9/0x670 [ 949.401220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.406409] RIP: 0033:0x45dcc7 [ 949.409610] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.428517] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.436227] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 949.443503] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 949.450862] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 949.458134] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 949.465404] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:12 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x3f000000}) 18:42:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfffffff6, &(0x7f0000000040)) 18:42:12 executing program 4 (fault-call:3 fault-nth:20): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 949.589764] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 18:42:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001022000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 949.679119] EXT4-fs (loop3): get root inode failed 18:42:12 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0xfdfdffff}) [ 949.711836] EXT4-fs (loop3): mount failed 18:42:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:12 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0xfffffdfd}) [ 949.833326] FAULT_INJECTION: forcing a failure. [ 949.833326] name failslab, interval 1, probability 0, space 0, times 0 [ 949.849059] CPU: 1 PID: 3464 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 949.856872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.866225] Call Trace: [ 949.868904] dump_stack+0x22c/0x33e [ 949.872588] should_fail.cold+0xa/0x2f [ 949.876487] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.881609] __should_failslab+0x153/0x1b6 [ 949.885856] should_failslab+0x5/0xf [ 949.889578] kmem_cache_alloc_node+0x245/0x4d0 [ 949.894168] ? lock_downgrade+0x750/0x750 [ 949.898322] __alloc_skb+0x71/0x580 [ 949.901959] alloc_uevent_skb+0x7b/0x210 [ 949.906031] kobject_uevent_env+0x94f/0x1390 [ 949.910456] lo_ioctl+0x1002/0x2200 [ 949.914097] ? loop_set_status64+0x110/0x110 [ 949.918511] blkdev_ioctl+0x5cb/0x1a7e [ 949.922407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.927778] ? blkpg_ioctl+0x9c0/0x9c0 [ 949.931670] ? mark_held_locks+0xf0/0xf0 [ 949.935736] ? find_held_lock+0x2d/0x110 [ 949.939801] ? debug_check_no_obj_freed+0x201/0x482 [ 949.944941] block_ioctl+0xe9/0x130 [ 949.948571] ? blkdev_fallocate+0x3f0/0x3f0 [ 949.952897] do_vfs_ioctl+0xcdb/0x12e0 [ 949.956800] ? selinux_file_ioctl+0x44f/0x5e0 [ 949.961299] ? ioctl_preallocate+0x200/0x200 [ 949.965715] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 949.971172] ? __fget+0x3ad/0x570 [ 949.974636] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 949.978875] ? do_syscall_64+0x207/0x670 [ 949.982944] ? check_preemption_disabled+0x41/0x2b0 [ 949.987973] ksys_ioctl+0x9b/0xc0 [ 949.991435] __x64_sys_ioctl+0x6f/0xb0 [ 949.995331] do_syscall_64+0xf9/0x670 [ 949.999141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.004330] RIP: 0033:0x45dcc7 [ 950.007528] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.026426] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.034151] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 950.041420] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 950.048692] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 950.055978] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 950.063247] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001023000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:12 executing program 4 (fault-call:3 fault-nth:21): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 950.232427] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 950.272464] EXT4-fs (loop3): group descriptors corrupted! 18:42:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfffffffb, &(0x7f0000000040)) 18:42:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000102c000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 950.383486] FAULT_INJECTION: forcing a failure. [ 950.383486] name failslab, interval 1, probability 0, space 0, times 0 [ 950.416593] CPU: 0 PID: 3502 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 950.424426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.433769] Call Trace: [ 950.436370] dump_stack+0x22c/0x33e [ 950.440019] should_fail.cold+0xa/0x2f [ 950.443913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.449033] __should_failslab+0x153/0x1b6 [ 950.453273] should_failslab+0x5/0xf [ 950.456993] kmem_cache_alloc_node+0x245/0x4d0 [ 950.461584] ? lock_downgrade+0x750/0x750 [ 950.465742] __alloc_skb+0x71/0x580 [ 950.469378] alloc_uevent_skb+0x7b/0x210 [ 950.473448] kobject_uevent_env+0x94f/0x1390 [ 950.477875] lo_ioctl+0x1002/0x2200 [ 950.481516] ? loop_set_status64+0x110/0x110 [ 950.485933] blkdev_ioctl+0x5cb/0x1a7e [ 950.489824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.495218] ? blkpg_ioctl+0x9c0/0x9c0 [ 950.499134] ? mark_held_locks+0xf0/0xf0 [ 950.503206] ? find_held_lock+0x2d/0x110 [ 950.507271] ? debug_check_no_obj_freed+0x201/0x482 [ 950.512307] block_ioctl+0xe9/0x130 [ 950.515942] ? blkdev_fallocate+0x3f0/0x3f0 [ 950.520271] do_vfs_ioctl+0xcdb/0x12e0 [ 950.524162] ? selinux_file_ioctl+0x44f/0x5e0 [ 950.528665] ? ioctl_preallocate+0x200/0x200 [ 950.533081] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 950.538532] ? __fget+0x3ad/0x570 [ 950.542002] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 950.546242] ? do_syscall_64+0x207/0x670 [ 950.550310] ? check_preemption_disabled+0x41/0x2b0 [ 950.555339] ksys_ioctl+0x9b/0xc0 [ 950.558800] __x64_sys_ioctl+0x6f/0xb0 [ 950.562701] do_syscall_64+0xf9/0x670 [ 950.566521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.571714] RIP: 0033:0x45dcc7 [ 950.574911] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.593911] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 950.601624] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 950.608899] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 950.616168] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 950.623441] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 18:42:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:13 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000100)={@hyper, 0x1}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r3) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000140)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0)=0x101, 0x4) [ 950.630714] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:13 executing program 4 (fault-call:3 fault-nth:22): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 950.756572] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 950.785013] EXT4-fs (loop3): group descriptors corrupted! 18:42:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfffffffd, &(0x7f0000000040)) 18:42:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001048000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 950.924456] FAULT_INJECTION: forcing a failure. [ 950.924456] name failslab, interval 1, probability 0, space 0, times 0 [ 950.953569] CPU: 0 PID: 3534 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 950.961388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.970744] Call Trace: [ 950.973341] dump_stack+0x22c/0x33e [ 950.976976] should_fail.cold+0xa/0x2f [ 950.980880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.986011] __should_failslab+0x153/0x1b6 [ 950.990269] should_failslab+0x5/0xf [ 950.993991] kmem_cache_alloc+0x2b1/0x4a0 [ 950.998149] ? netlink_broadcast_filtered+0x72/0xbc0 [ 951.003261] skb_clone+0x151/0x3d0 [ 951.006813] netlink_broadcast_filtered+0x8df/0xbc0 [ 951.011860] netlink_broadcast+0x35/0x40 [ 951.015933] kobject_uevent_env+0x916/0x1390 [ 951.020359] lo_ioctl+0x1002/0x2200 [ 951.023999] ? loop_set_status64+0x110/0x110 [ 951.028413] blkdev_ioctl+0x5cb/0x1a7e [ 951.032318] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.037687] ? blkpg_ioctl+0x9c0/0x9c0 [ 951.041584] ? mark_held_locks+0xf0/0xf0 [ 951.045655] ? find_held_lock+0x2d/0x110 [ 951.049723] ? debug_check_no_obj_freed+0x201/0x482 [ 951.054760] block_ioctl+0xe9/0x130 [ 951.058389] ? blkdev_fallocate+0x3f0/0x3f0 [ 951.062717] do_vfs_ioctl+0xcdb/0x12e0 [ 951.066615] ? selinux_file_ioctl+0x44f/0x5e0 [ 951.071126] ? ioctl_preallocate+0x200/0x200 [ 951.075542] ? selinux_parse_skb.constprop.0+0x1f0/0x1f0 [ 951.081003] ? __fget+0x3ad/0x570 [ 951.084469] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 951.088709] ? do_syscall_64+0x207/0x670 [ 951.092782] ? check_preemption_disabled+0x41/0x2b0 [ 951.097819] ksys_ioctl+0x9b/0xc0 [ 951.101293] __x64_sys_ioctl+0x6f/0xb0 [ 951.105190] do_syscall_64+0xf9/0x670 [ 951.109012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.114198] RIP: 0033:0x45dcc7 [ 951.117394] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.136638] RSP: 002b:00007fa359855a28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 951.144347] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045dcc7 [ 951.151621] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 951.158893] RBP: 0000000000000000 R08: 0000000020000218 R09: 0000000000000000 [ 951.166169] R10: 0000000000002000 R11: 0000000000000246 R12: 0000000000000001 [ 951.173439] R13: 0000000000000006 R14: 0000000000000006 R15: 0000000020000228 18:42:13 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f0000001300)={0x0, 0x9effffff, &(0x7f0000000180)={&(0x7f0000000640)={0x14, r3, 0x309, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0xa0028000}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x4, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8880}, 0x4040080) 18:42:13 executing program 4 (fault-call:3 fault-nth:23): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfffffffe, &(0x7f0000000040)) 18:42:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000104c000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 951.339489] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 951.412387] EXT4-fs (loop3): group descriptors corrupted! [ 951.433242] FAULT_INJECTION: forcing a failure. [ 951.433242] name failslab, interval 1, probability 0, space 0, times 0 [ 951.444993] CPU: 0 PID: 3561 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 951.452798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.462158] Call Trace: [ 951.464767] dump_stack+0x22c/0x33e [ 951.468408] should_fail.cold+0xa/0x2f [ 951.472310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.477427] ? lock_acquire+0x170/0x3f0 [ 951.481419] __should_failslab+0x153/0x1b6 [ 951.485663] should_failslab+0x5/0xf [ 951.489383] kmem_cache_alloc+0x2b1/0x4a0 [ 951.493548] getname_flags+0xce/0x590 [ 951.497366] ? do_syscall_64+0x207/0x670 [ 951.501439] do_mkdirat+0x8d/0x2d0 [ 951.504986] ? __ia32_sys_mknod+0x120/0x120 [ 951.509318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 951.514701] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 951.519835] ? do_syscall_64+0x21/0x670 [ 951.523825] do_syscall_64+0xf9/0x670 [ 951.527638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.532835] RIP: 0033:0x45d277 [ 951.536035] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.554937] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 951.562652] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 951.570190] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 951.577463] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 951.584916] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 951.592188] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:14 executing program 4 (fault-call:3 fault-nth:24): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:14 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) bind$phonet(0xffffffffffffffff, &(0x7f0000000100)={0x23, 0x3, 0x7, 0x2}, 0x10) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x100004f6d, &(0x7f0000000040)) [ 951.831712] FAULT_INJECTION: forcing a failure. [ 951.831712] name failslab, interval 1, probability 0, space 0, times 0 [ 951.854341] CPU: 0 PID: 3582 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 951.862154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.871509] Call Trace: [ 951.874106] dump_stack+0x22c/0x33e [ 951.877749] should_fail.cold+0xa/0x2f [ 951.881651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.886864] ? lock_acquire+0x170/0x3f0 [ 951.890860] __should_failslab+0x153/0x1b6 [ 951.895106] should_failslab+0x5/0xf [ 951.898828] kmem_cache_alloc+0x2b1/0x4a0 [ 951.902992] getname_flags+0xce/0x590 [ 951.906801] ? do_syscall_64+0x207/0x670 [ 951.910881] do_mkdirat+0x8d/0x2d0 [ 951.914439] ? __ia32_sys_mknod+0x120/0x120 [ 951.918770] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 951.924150] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 951.929263] ? do_syscall_64+0x21/0x670 [ 951.933255] do_syscall_64+0xf9/0x670 [ 951.937062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.942254] RIP: 0033:0x45d277 [ 951.945450] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.964351] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 951.972064] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 951.979336] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 951.986605] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 951.993883] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 952.001158] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:14 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x1, 0x40000) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f0000001180)=ANY=[@ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x20004080}, 0x40) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r3 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) r4 = syz_open_procfs(0x0, &(0x7f0000000ac0)='net/ip6_flowlabel\x00') ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000002c0)={0x4, 0x1f, 0x14, r3, 0x0, &(0x7f0000000280)={0xa30904, 0x200, [], @string=&(0x7f0000000240)}}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f0000000680)='msdos\x00', &(0x7f00000006c0)='./file0\x00', 0x10000000000000, 0xa, &(0x7f00000009c0)=[{&(0x7f0000001a00)="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", 0x1000, 0x100000000}, {&(0x7f0000000700)="f4a4bff4c64b6351087b55d26fee65d74339c8f88ccf2faed8fe5778c833632bd371e643", 0x24, 0x887e}, {&(0x7f0000002a00)="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", 0x1000, 0x1ff}, {&(0x7f0000000740)="4322e101e5ed79310c3856733cfe6793800c597ddc31dec763fdc0990b7c390e5600526490d7e08cdf60ef2c5c94b3d4b86c60a533958c", 0x37, 0xab}, {&(0x7f0000000780)="ed1916edaabeba27a5d3689613c7fdd034cd7717af9e3378f7d7e542faab565a735a5cae83a3924a19a06abb7bbd41e6a31b1f8c3c9cf4ce0192a4edc4c0dd03c8e001ff2f72f4a295c2b10e677a3be845f12767d0f41e7844656c6086171f7b7a0ecc976e0218cafd6a18d5ae4e985b", 0x70, 0x3}, {&(0x7f0000000800)="924a7e8da901e05f9df6e97108a460a35c2da8d30f380c6733f1e2479b05a0460ed742fbe774a38c0fcffcd25257f34450902751905ec220cf616c2967b4fe5419fc7a8e457dc2c76c5cb1757584b073809ad8", 0x53, 0x3a23}, {&(0x7f0000000880)="69fe5ab370f1c2080e68ad4d432e67f648795860d7876513697ea59fd8b933c785e04f6c13fe91879e9d334e3be6dc1c049600000000f03f000092f0b9860cc22e6166a7f583f5e9016f9ba6339db4ab0b713395", 0x54, 0x100000001}, {&(0x7f0000003a00)="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"/4096, 0x1000, 0xebf5}, {&(0x7f0000000900), 0x0, 0x9ac3}, {&(0x7f0000000940)="fe9e63c5324b4d18eab1ec6214d9c03730cabb1b29fa43198edb637ec3192645965787b83fd13ce7c193cd786b3e1378a56d197dbe9d36005a10d450413e802715c1942962d275a016a8", 0x4a, 0x6}], 0x20000, &(0x7f0000000b40)=ANY=[@ANYBLOB='nodots,usefree,gid=', @ANYRESHEX, @ANYBLOB=',dots,nodots,rootcontext=user_u,subj_ro,e=([,\x00']) ioctl$FIGETBSZ(r4, 0x2, &(0x7f0000000b00)) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000e00)='nl80211\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f00000019c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r9, @ANYBLOB="26003300d0800000ffff8b46ffff080211000000080211000000530548832e3f1215803101000000"], 0x44}}, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000900)) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000580)="439c57d32f1f6b7719e75ff0c559b799961ed37139acd9b1d87529b6ad408da86d78edb52d1619bd557bf00241658c96b36e04f1faf03a4824f97b3ed311b6b6fcbc72b9d5d35731a33495a13a83008cf7bd408a14520ea5fd61ae7f4ed77a707e439de1c52b111e0e51db783f2ac4a0edb1f7c0a8535257b485bc33b901933f9850bd0f69c962ae625e6107f974e2ae1cf4b77b3a5181e7203b008c0d881d589b87fae87491da10b3a4d63c75965908ad7b1397f21699643578f1ccc269cf7a5938dc4e9d205f5d2483e2e15a95b4bec9ac422084b9863dc04b14bc36ef23405a32e600bea7d8", 0xe7) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="b90c1a604801c873440207e5e758a2ebf9ada22ef94922847bfc90b621a662584652285dd7c50abc237966bb84fa787bfec14d500c4a462df5e3b3bed3054d94293b3ab37cb94b08dfc3ca3bd7d8a9917766bbbd17bfcd4439de778832c30b051a47b87604", @ANYRES16=r5, @ANYBLOB='\x00\x00', @ANYRES32=r9, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x2000804}, 0x2002801) 18:42:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001060000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:14 executing program 4 (fault-call:3 fault-nth:25): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 952.049980] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 952.079378] EXT4-fs (loop3): group descriptors corrupted! 18:42:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1000000000, &(0x7f0000000040)) 18:42:14 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 952.280104] FAULT_INJECTION: forcing a failure. [ 952.280104] name failslab, interval 1, probability 0, space 0, times 0 18:42:14 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) fcntl$getown(r0, 0x9) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)) [ 952.338981] CPU: 1 PID: 3609 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 952.346816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.356168] Call Trace: [ 952.358761] dump_stack+0x22c/0x33e [ 952.362405] should_fail.cold+0xa/0x2f [ 952.366306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 952.371413] ? lock_acquire+0x170/0x3f0 [ 952.375405] __should_failslab+0x153/0x1b6 [ 952.379654] should_failslab+0x5/0xf [ 952.383374] kmem_cache_alloc+0x2b1/0x4a0 18:42:14 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000240)="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") r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="4ceaff00", @ANYRES16=r5], 0x4c}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="f6bf78bcbe1476321d63f903e50055f30f0c34", @ANYRES16=r5, @ANYBLOB="010028bd7000fbdbdf250100000006000b000f00000014000600"/42], 0x30}, 0x1, 0x0, 0x0, 0x4c804}, 0x40004) accept$unix(r2, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x200800, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f00000004c0)=0x3, 0x4) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 952.387541] getname_flags+0xce/0x590 [ 952.391353] ? do_syscall_64+0x207/0x670 [ 952.395419] do_mkdirat+0x8d/0x2d0 [ 952.398970] ? __ia32_sys_mknod+0x120/0x120 [ 952.403299] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 952.408674] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 952.413788] ? do_syscall_64+0x21/0x670 [ 952.417773] do_syscall_64+0xf9/0x670 [ 952.421584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.426776] RIP: 0033:0x45d277 18:42:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001068000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 952.429973] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.448898] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 952.448916] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 952.448925] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 952.448934] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 952.448944] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 952.448954] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:15 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0xa080, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local, 0x1}, 0x1}) 18:42:15 executing program 4 (fault-call:3 fault-nth:26): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xedc000000000, &(0x7f0000000040)) 18:42:15 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000005c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x40, 0x5, &(0x7f0000000440)=[{&(0x7f0000000180)="eb9e5eec71c1ad114c279626261562c288f7aacaf0fbfaf8de715475b5f3f3332d7dec2a96df7b8dcbbe5bd011a61bb625f982c049fd8683f40f323874caa2f60219f46ac7deef1e80f4d8a442a60de9975def346c8aa436b84f1a1e00f8652e48c8e3f8a1823e017e059c98cc49b46246d2f74918cfac2e704e9ead2c99905c04f66b86122ad0a70061d11490180c815341d4680eae05e1c779191db617765fb48d41239c561f3c7bf368fbec3a36712e440200fe844099aaa0902018a93f8146e6", 0xc2, 0x4}, {&(0x7f0000000280)="48a3738cfb2a52cbe0017b6973c855306c934c21e6ead5b1bd5ae80541a9d29962e82aae31488f097b26fefd0439aa6094ce56fb18f6cb27afc9dd8a24b511cf1d37c8328901d56cbd4486136f305535c8bf41f480762e16d91f72287ef060c9ce60d5218540bff142e10ef0a5be01f93cfd3123c33e85e5", 0x78, 0x100}, {&(0x7f0000000300)="7a22fe3d343a05fe2700e553bd065ddb1e114532a8735e3de3da2f194a9c3bc41194e54d805a10b0046ee3f0350b98708c8a2d1a6c32761c8c94bf2cabe54af111104127792573dd0bfea15e15f18e9f2b26a1222159ebf1a5e1c899511e95861fc696f9ff60af94bd4a1242790c5d599d3fce4988bd2b0cc9651ed78c56a22b8e7cfd1331e41e894ceb3780118de5840f8d49efd9a04bb922d1ac0e3c8e10f783ddabfbe614a47b2a6ed93f5de7c759e3afb894237c0516", 0xb8, 0x3}, {&(0x7f00000003c0)="80f476238d831de93c72c6768f55d30b4c2348695ed48c56a73d4a90adf82727ae857d566bb2949206dc05727e", 0x2d, 0x80000001}, {&(0x7f0000000400)="d736f6", 0x3, 0x3}], 0xc0042, &(0x7f0000000880)=ANY=[@ANYBLOB='data_err=abort,bh,data=writeback,dioread_nolock,appraise,permit_directio,uid<', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=r1, @ANYBLOB=',audit,obj_role=,\x00']) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000700)={0x6, @multicast}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 952.555941] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 952.575992] EXT4-fs (loop3): group descriptors corrupted! 18:42:15 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x3}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)) [ 952.688605] FAULT_INJECTION: forcing a failure. [ 952.688605] name failslab, interval 1, probability 0, space 0, times 0 18:42:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000106c000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:15 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x5) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x88, 0x1403, 0x300, 0x70bd28, 0x25dfdbfd, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'sit0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth1_virt_wifi\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'ipvlan0\x00'}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) [ 952.757333] CPU: 1 PID: 3655 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 952.765166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.774523] Call Trace: [ 952.777123] dump_stack+0x22c/0x33e [ 952.780779] should_fail.cold+0xa/0x2f [ 952.784679] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 952.789799] ? security_compute_sid.part.0+0xe31/0x13e0 [ 952.795188] __should_failslab+0x153/0x1b6 [ 952.799449] should_failslab+0x5/0xf [ 952.803176] kmem_cache_alloc+0x2b1/0x4a0 [ 952.807427] ? bdev_try_to_free_page+0x1a0/0x1a0 [ 952.812195] ext4_alloc_inode+0x1a/0x630 [ 952.816267] ? bdev_try_to_free_page+0x1a0/0x1a0 [ 952.821032] alloc_inode+0x5d/0x180 [ 952.824666] new_inode+0x1d/0xf0 [ 952.828142] __ext4_new_inode+0x400/0x5e40 [ 952.832427] ? ext4_free_inode+0x18d0/0x18d0 [ 952.836885] ? __dquot_initialize+0x2b2/0xd40 [ 952.841393] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 952.846073] ? dquot_initialize_needed+0x290/0x290 [ 952.851025] ? security_transition_sid+0x142/0x1b0 [ 952.855965] ? security_transition_sid+0x10b/0x1b0 [ 952.860912] ext4_mkdir+0x55f/0xdd0 [ 952.864552] ? selinux_binder_transfer_file+0x790/0x790 [ 952.869929] ? ext4_init_dot_dotdot+0x620/0x620 [ 952.874624] vfs_mkdir+0x45b/0x730 [ 952.878179] do_mkdirat+0x262/0x2d0 [ 952.881818] ? __ia32_sys_mknod+0x120/0x120 [ 952.886164] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 952.891279] ? do_syscall_64+0x21/0x670 [ 952.895271] do_syscall_64+0xf9/0x670 [ 952.899087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 952.904280] RIP: 0033:0x45d277 [ 952.907490] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 952.926392] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 952.934110] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 952.941388] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 952.948670] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 18:42:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {0x0, 0x0, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 952.955959] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 952.963231] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:15 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000200)=0x1, 0x4) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x5, 0x1, 0x3, 0x0, 0x0, {0x84d76d30c171163b}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4084) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1000000000000, &(0x7f0000000040)) 18:42:15 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$FBIOBLANK(0xffffffffffffffff, 0x4611, 0x2) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000100)=0x1000001, 0x4) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:15 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x80000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x0, 0x10000) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000140)) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcsu\x00', 0x10000, 0x0) accept4$vsock_stream(r2, &(0x7f0000000480)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x800) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:15 executing program 4 (fault-call:3 fault-nth:27): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 953.171152] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 953.207808] EXT4-fs (loop3): group descriptors corrupted! 18:42:15 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0xc000) getsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000140)=""/213, &(0x7f0000000240)=0xd5) 18:42:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001074000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:15 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x68001, 0x40) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) 18:42:15 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 953.364975] FAULT_INJECTION: forcing a failure. [ 953.364975] name failslab, interval 1, probability 0, space 0, times 0 18:42:15 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4000000000000, &(0x7f0000000040)) [ 953.409294] CPU: 1 PID: 3709 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 953.417126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.426480] Call Trace: [ 953.429069] dump_stack+0x22c/0x33e [ 953.432719] should_fail.cold+0xa/0x2f [ 953.436606] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 953.441711] ? security_compute_sid.part.0+0xe31/0x13e0 [ 953.447097] __should_failslab+0x153/0x1b6 [ 953.451340] should_failslab+0x5/0xf [ 953.455051] kmem_cache_alloc+0x2b1/0x4a0 [ 953.459187] ? bdev_try_to_free_page+0x1a0/0x1a0 [ 953.463926] ext4_alloc_inode+0x1a/0x630 [ 953.467983] ? bdev_try_to_free_page+0x1a0/0x1a0 [ 953.472722] alloc_inode+0x5d/0x180 [ 953.476329] new_inode+0x1d/0xf0 [ 953.479726] __ext4_new_inode+0x400/0x5e40 [ 953.483955] ? ext4_free_inode+0x18d0/0x18d0 [ 953.488344] ? __dquot_initialize+0x2b2/0xd40 [ 953.492823] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 953.497476] ? dquot_initialize_needed+0x290/0x290 [ 953.502398] ? security_transition_sid+0x142/0x1b0 [ 953.507324] ? security_transition_sid+0x10b/0x1b0 [ 953.512241] ext4_mkdir+0x55f/0xdd0 [ 953.515857] ? selinux_binder_transfer_file+0x790/0x790 [ 953.521251] ? ext4_init_dot_dotdot+0x620/0x620 [ 953.525929] vfs_mkdir+0x45b/0x730 [ 953.529484] do_mkdirat+0x262/0x2d0 [ 953.533102] ? __ia32_sys_mknod+0x120/0x120 [ 953.537585] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 953.542681] ? do_syscall_64+0x21/0x670 [ 953.546651] do_syscall_64+0xf9/0x670 [ 953.550439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.555611] RIP: 0033:0x45d277 [ 953.558788] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 953.577674] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 953.585377] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 953.592642] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 953.599905] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 18:42:16 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}}) [ 953.607168] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 953.614429] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:16 executing program 4 (fault-call:3 fault-nth:28): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:16 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@local}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000107a000c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:16 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000140), &(0x7f00000001c0)=0x6) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) dup2(r1, r3) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7ffffffffffff, &(0x7f0000000040)) [ 953.847945] FAULT_INJECTION: forcing a failure. [ 953.847945] name failslab, interval 1, probability 0, space 0, times 0 [ 953.871492] CPU: 1 PID: 3745 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 953.879322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.888674] Call Trace: [ 953.891271] dump_stack+0x22c/0x33e [ 953.894917] should_fail.cold+0xa/0x2f [ 953.898816] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 953.903939] __should_failslab+0x153/0x1b6 [ 953.908183] should_failslab+0x5/0xf [ 953.911893] kmem_cache_alloc+0x2b1/0x4a0 [ 953.916036] __d_alloc+0x2b/0xa20 [ 953.919473] d_alloc+0x4a/0x230 [ 953.922737] __lookup_hash+0xc8/0x180 [ 953.926521] filename_create+0x186/0x490 [ 953.930663] ? kern_path_mountpoint+0x40/0x40 [ 953.935151] ? strncpy_from_user+0x2b1/0x370 [ 953.939545] ? getname_flags+0x25b/0x590 [ 953.943587] do_mkdirat+0xa0/0x2d0 [ 953.947111] ? __ia32_sys_mknod+0x120/0x120 [ 953.951467] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 953.956552] ? do_syscall_64+0x21/0x670 [ 953.960519] do_syscall_64+0xf9/0x670 [ 953.964315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 953.969484] RIP: 0033:0x45d277 [ 953.972668] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:42:16 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = msgget$private(0x0, 0x20) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000280)=""/167) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x301842, 0x0) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000140)=""/208) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x140081, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r3, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@host}, 0x1, 0x1, 0x2081}) 18:42:16 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000140)=0x10000) dup2(r1, r2) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000100)=0x1) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 953.991658] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 953.999366] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 954.006623] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 954.013872] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 954.021124] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 954.028376] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 954.056132] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 954.094347] EXT4-fs (loop3): group descriptors corrupted! 18:42:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:16 executing program 4 (fault-call:3 fault-nth:29): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:16 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:16 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) 18:42:16 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000100)={{@hyper, 0xffffff01}, 0x0, 0x1, 0x3}) 18:42:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x10000000000000, &(0x7f0000000040)) [ 954.319569] FAULT_INJECTION: forcing a failure. [ 954.319569] name failslab, interval 1, probability 0, space 0, times 0 [ 954.331145] CPU: 0 PID: 3793 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 954.335054] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 954.338937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.357676] Call Trace: [ 954.360276] dump_stack+0x22c/0x33e [ 954.363921] should_fail.cold+0xa/0x2f [ 954.367818] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 954.372934] ? mark_held_locks+0xf0/0xf0 [ 954.377018] ? security_compute_validatetrans.part.0+0x780/0x780 [ 954.383168] ? ebitmap_cmp+0x1a5/0x220 [ 954.387079] __should_failslab+0x153/0x1b6 [ 954.391326] should_failslab+0x5/0xf [ 954.395046] __kmalloc+0x6d/0x4f0 [ 954.398510] ? context_struct_to_string+0x3dc/0x7a0 [ 954.403541] context_struct_to_string+0x3dc/0x7a0 [ 954.408415] ? get_permissions_callback+0xb0/0xb0 [ 954.409381] EXT4-fs (loop3): group descriptors corrupted! [ 954.413259] ? security_sid_to_context_core+0x27b/0x440 [ 954.413280] ? security_transition_sid+0x142/0x1b0 [ 954.413305] security_sid_to_context_core+0x2ea/0x440 [ 954.413327] selinux_inode_init_security+0x453/0x7e0 [ 954.413345] ? selinux_file_mprotect+0x660/0x660 [ 954.413365] ? ext4_get_acl+0x114/0x610 [ 954.413379] ? forget_cached_acl+0x70/0x70 [ 954.413405] security_inode_init_security+0x14b/0x370 [ 954.413419] ? ext4_xattr_security_get+0x40/0x40 [ 954.413437] ? unregister_lsm_notifier+0x20/0x20 [ 954.413460] ? insert_inode_locked+0x424/0x530 [ 954.471796] ? check_preemption_disabled+0x41/0x2b0 [ 954.476807] ? prandom_u32_state+0x10/0x180 [ 954.481130] __ext4_new_inode+0x42e5/0x5e40 [ 954.485480] ? ext4_free_inode+0x18d0/0x18d0 [ 954.489886] ? __dquot_initialize+0x2b2/0xd40 [ 954.494388] ? avc_has_perm_noaudit+0x3e0/0x3e0 [ 954.499101] ? dquot_initialize_needed+0x290/0x290 [ 954.504026] ? security_transition_sid+0x142/0x1b0 [ 954.508964] ? security_transition_sid+0x10b/0x1b0 [ 954.513917] ext4_mkdir+0x55f/0xdd0 [ 954.517543] ? selinux_binder_transfer_file+0x790/0x790 [ 954.522908] ? ext4_init_dot_dotdot+0x620/0x620 [ 954.527595] vfs_mkdir+0x45b/0x730 [ 954.531149] do_mkdirat+0x262/0x2d0 [ 954.534771] ? __ia32_sys_mknod+0x120/0x120 [ 954.539074] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 954.544174] ? do_syscall_64+0x21/0x670 [ 954.548143] do_syscall_64+0xf9/0x670 [ 954.551942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 954.557120] RIP: 0033:0x45d277 [ 954.560343] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 954.579225] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 954.586917] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 954.594177] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 954.601447] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 954.608714] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 954.615973] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:17 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) 18:42:17 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@host, 0x4}}) 18:42:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300), 0x0, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:17 executing program 4 (fault-call:3 fault-nth:30): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x20000000000000, &(0x7f0000000040)) 18:42:17 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="12825dd619c07e451eefbeea80e45f82", 0x10, 0xfffffffffffffffa) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:17 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x8], 0x1, 0x800, 0x0, 0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x249c0504}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x1412, 0x20, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x40}}, 0x4004040) [ 954.864151] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 954.896827] EXT4-fs (loop3): group descriptors corrupted! [ 954.901346] FAULT_INJECTION: forcing a failure. [ 954.901346] name failslab, interval 1, probability 0, space 0, times 0 18:42:17 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 954.946755] CPU: 1 PID: 3834 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 954.954583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.963935] Call Trace: [ 954.966533] dump_stack+0x22c/0x33e [ 954.970177] should_fail.cold+0xa/0x2f [ 954.974074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 954.979177] __should_failslab+0x153/0x1b6 [ 954.983412] should_failslab+0x5/0xf [ 954.987166] __kmalloc+0x2dd/0x4f0 [ 954.990706] ? ext4_find_extent+0x9be/0xc70 [ 954.995028] ? __kernel_text_address+0x9/0x30 [ 954.999604] ? unwind_get_return_address+0x51/0x90 [ 955.004521] ext4_find_extent+0x9be/0xc70 [ 955.008675] ext4_ext_map_blocks+0x1c0/0x7340 [ 955.013166] ? __lock_acquire+0x6ec/0x3ff0 [ 955.017391] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 955.022392] ? mark_held_locks+0xf0/0xf0 [ 955.026436] ? __ext4_handle_dirty_metadata+0x1e0/0x650 [ 955.031785] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 955.036958] ? mark_held_locks+0xf0/0xf0 [ 955.041007] ? ext4_mark_iloc_dirty+0x17ae/0x2b70 [ 955.045843] ? find_held_lock+0x2d/0x110 [ 955.049891] ? ext4_es_lookup_extent+0x375/0xba0 [ 955.054644] ? lock_acquire+0x170/0x3f0 [ 955.058602] ? ext4_map_blocks+0x33f/0x19e0 [ 955.062915] ext4_map_blocks+0xda6/0x19e0 [ 955.067053] ? ext4_issue_zeroout+0x180/0x180 [ 955.071547] ? __brelse+0x84/0xa0 [ 955.074989] ? __ext4_new_inode+0x2eb/0x5e40 [ 955.079395] ext4_getblk+0xad/0x510 [ 955.083007] ? ext4_iomap_begin+0xf40/0xf40 [ 955.087323] ? ext4_free_inode+0x18d0/0x18d0 [ 955.091717] ? __dquot_initialize+0x2b2/0xd40 [ 955.096983] ext4_bread+0x7c/0x210 [ 955.100507] ? ext4_getblk+0x510/0x510 [ 955.104381] ? dquot_initialize_needed+0x290/0x290 [ 955.109298] ? security_transition_sid+0x142/0x1b0 [ 955.114239] ? security_transition_sid+0x10b/0x1b0 [ 955.119164] ext4_append+0x177/0x390 [ 955.122875] ext4_mkdir+0x33a/0xdd0 [ 955.126501] ? ext4_init_dot_dotdot+0x620/0x620 [ 955.131181] vfs_mkdir+0x45b/0x730 [ 955.134715] do_mkdirat+0x262/0x2d0 [ 955.138333] ? __ia32_sys_mknod+0x120/0x120 [ 955.142646] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 955.147739] ? do_syscall_64+0x21/0x670 [ 955.151721] do_syscall_64+0xf9/0x670 [ 955.155515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.160690] RIP: 0033:0x45d277 [ 955.163873] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 955.182758] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 955.190461] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 18:42:17 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xfffffffffffffffa, 0x527201) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000140)={0x0, 0xbfc, 0x3}) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:17 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x10800, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x313000, 0x0) statx(r1, &(0x7f0000001840)='./file0\x00', 0x6000, 0x80, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ocfs2(&(0x7f00000001c0)='ocfs2\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x9, &(0x7f0000001740)=[{&(0x7f0000000280)="751c8486ed13705ecfc2f5dbbf29bee3247610511ef4", 0x16, 0x5}, {&(0x7f00000002c0)="529e76b1567ab104e9e8d1f8b5967b41cce24b65b29781d0be484ba2230c9dfc4d5f83ca51dec776b1be911077fa272d790bdffae9385d0b0d1936ea176cb38a3ab8f602748dd8ef86c4a08815b289716b17f0ed8837414a3e9b0a81781001d452fdbdd1433489d8f696b9676989078f1ee88e724775abb11f6cd42ac5711dfa0460f5fe14ec11fe2a77a99c5b72d60a8b7be716b7d706eb7a2b0a61d604d1ad78277d74cdac8d95d8939a361f7db92eedb6426e344aadd0aa466ed802ad2f242d35eb16628947715365b76c02a869c12732f302d14e", 0xd6, 0x7}, {&(0x7f00000003c0)="4207d0c76f494b7d9d12eb09b087fb4c6ba05d9fc4e450dad43019b1bc8667ea71e23c9c33caed72271ae9932ff0c0319dd48b6418ad85857280bb48ce99325ac72f05a8c3a7f63343327f32aa8ecc3c75ea36653745b842548cb0190c77b97f89f1a77f7337e93a94e69f1d1bbd8ee8c7835a1e3cb0a5c9e57a4fd0114906c5f1980d082da5ac613ac4a6a452b3cee93825e83f61cbcc37c8aa1953b06a57828972490b0826e0ebd594c4d178e4b6d29f4c", 0xb2, 0xfffffffffffffffb}, {&(0x7f0000000480)="6d2c516db6f26542ffa79302c782b9b45b6e3b0fee0d6efe411c7343b1d82853b2c36de2d7711afa6b3722803ee2a758315869007c6b49ee9e1c50cd919eebc88ee52a6c62664868fa320d0a0b735f8a710c5775f45807cd8686eefd3b89b20e7b759783082f5de2278a435f0153b246958caf2d75df314d9236d5983edf3a30b3136adcc7c2e6", 0x87, 0x9}, {&(0x7f0000000540)="eecbdfc83b3c8614233392ad13ba394ae18a24fabb9eae2a7a7e1e9d7bac623dc9419f2177dc39af5a481a666398adfa8cb3dbeca7471065a59dd6f995ee071f7bea6337a209fe9c413264ef", 0x4c, 0x1}, {&(0x7f00000005c0)="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", 0x1000, 0x3}, {&(0x7f00000015c0)="9d117f0d24ce22e2b5e1afec9c992dce10ba90244c211ef04f7391f396c6ab9851718e869302bdbd7f66c63decd651d8e726fa9cac0cba33df4fc13afe1efd2fc95c01364ac7b35d40f930d7fe542a91bd3d21dd2d9009aa21a415f0bfb1c632746f28fe726c1d52a3a584a9ab9921533cbebd4006168ccafa94de69ccf1991a1150a86a8040a760c67b2e642336f4369b36661b7b6eb7bcf5aef03b0fc47f718c2098604aebe5ae264082d8be38ef008e7394b7feae3d8000f256c53021745389df64a90c0f686e02ba20b3226970285eedc604ef4454", 0xd7, 0x2}, {&(0x7f00000016c0)="8903a4ea74312a3535e5f9c372cace39d0901251cfaaa2375b7fcd0c607a8fa1e2bb551f86236a46141a1428efcf58755e64b16cd2", 0x35}, {&(0x7f0000001700)="f5ecb2e29a4635a856e245da1dab5326dd05baa2f63c2bcffe6318be4a65e1b5b4cba5b52512b7d0130f8fd651172d56b4ac19b0c3", 0x35, 0x20}], 0x808401, &(0x7f0000001980)={[{'/dev/vcs\x00'}], [{@permit_directio='permit_directio'}, {@audit='audit'}, {@euid_gt={'euid>', r2}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}]}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) ioctl$IOCTL_VMCI_VERSION2(r3, 0x7a7, &(0x7f0000000080)=0x90000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 955.197716] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 955.204970] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 955.212225] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 955.219479] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x40000000000000, &(0x7f0000000040)) 18:42:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:17 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) r3 = accept4(r1, 0x0, &(0x7f0000000780), 0x80000) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xfc}}, 0x3c) dup2(r0, r2) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000300)={@caif, {&(0x7f0000000240)=""/125, 0x7d}, &(0x7f00000002c0), 0x59}, 0xa0) r4 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r5 = signalfd4(r4, &(0x7f0000000100)={[0x4b66]}, 0x8, 0x80800) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f0000000080)=0x10000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r4, 0x7a0, &(0x7f00000000c0)={@host}) sendmsg$TIPC_CMD_SET_NETID(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x24, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x8001}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000040}, 0x4004044) ioctl$VFIO_CHECK_EXTENSION(r5, 0x3b65, 0x5) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r4, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:17 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e21, 0x4, @private0, 0x56ce}, @in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e24, 0xfffffffd, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}], 0x64) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="b371b124dd690b752ea6b286512952ca7f9697ac03472d7b45690e5030bb098139af1ffe87b32a53a9f8aa71ecfe5760c618df7c9c1db341ae14f4bafa0fe0c14d588602014e268523932ebb3fe8304093644f2e632ca47afff2f341058550cc0476583c052c45208dc54ddd8c616d3fbf6433634697edc6c7b3a2f1dc5f36a2e75200004aafe1a877faac4b5a5470b40f603032e411033ba836a91204c24b04d6436f51fc1ff512059a749f1d843adb3632b3ee866d2e776a8c5f51a8871841f28cb7", 0xc3}], 0x1, 0x8, 0x80) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000200)=0x8001) 18:42:17 executing program 2: r0 = shmget(0x3, 0x2000, 0x1, &(0x7f0000ffb000/0x2000)=nil) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, r2) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) shmctl$IPC_SET(r0, 0x1, &(0x7f0000002140)={{0x3, 0xee01, 0xee01, r2, r3, 0x98}, 0x1ff, 0x6, 0xfffffffffffffffe, 0x2, 0xffffffffffffffff, 0x0, 0x800}) r4 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) socket$inet_sctp(0x2, 0xb, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000022c0)=ANY=[@ANYBLOB="146d96ee", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x7a, &(0x7f00000000c0)={r6}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000026c0)={r6, 0x1ff, 0x5000}, 0x8) ioctl$IOCTL_VMCI_VERSION2(r4, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r4, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r4, 0x7a6, &(0x7f0000000000)={{@local}}) r7 = open(&(0x7f00000021c0)='./file0\x00', 0x4000, 0x82) ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f0000002200)={{0x2, 0x4e20, @broadcast}, {0x1, @multicast}, 0x8, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x44}}, 'batadv_slave_0\x00'}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$USBDEVFS_REAPURB(0xffffffffffffffff, 0x4008550c, &(0x7f0000002280)) 18:42:18 executing program 4 (fault-call:3 fault-nth:31): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x60000000000000, &(0x7f0000000040)) 18:42:18 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) open(0x0, 0x0, 0x0) r2 = gettid() clock_gettime(0x2, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x68, 0x4, 0xa, 0x101}, 0x68}}, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 955.656509] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 955.685829] FAULT_INJECTION: forcing a failure. [ 955.685829] name failslab, interval 1, probability 0, space 0, times 0 [ 955.690570] EXT4-fs (loop3): group descriptors corrupted! [ 955.700074] CPU: 1 PID: 3896 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 955.710713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.720070] Call Trace: [ 955.722671] dump_stack+0x22c/0x33e [ 955.726311] should_fail.cold+0xa/0x2f [ 955.730215] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 955.735450] __should_failslab+0x153/0x1b6 [ 955.739692] should_failslab+0x5/0xf [ 955.743416] kmem_cache_alloc+0x2b1/0x4a0 [ 955.747584] ext4_mb_new_blocks+0x520/0x43e0 [ 955.752018] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 955.757048] ? __kmalloc+0x436/0x4f0 [ 955.760774] ? ext4_find_extent+0x9be/0xc70 [ 955.765099] ? ext4_cache_extents+0x68/0x2d0 [ 955.769504] ? ext4_discard_preallocations+0xfe0/0xfe0 [ 955.774772] ? ext4_ext_search_right+0x2c7/0xb60 [ 955.779521] ? ext4_inode_to_goal_block+0x2f2/0x3ed [ 955.784528] ext4_ext_map_blocks+0x299f/0x7340 [ 955.789097] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 955.794122] ? mark_held_locks+0xf0/0xf0 [ 955.798174] ? __ext4_handle_dirty_metadata+0x1e0/0x650 [ 955.803519] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 955.808704] ? mark_held_locks+0xf0/0xf0 [ 955.812755] ? ext4_mark_iloc_dirty+0x17ae/0x2b70 [ 955.817591] ? find_held_lock+0x2d/0x110 [ 955.821692] ? ext4_es_lookup_extent+0x375/0xba0 [ 955.826445] ? find_held_lock+0x2d/0x110 [ 955.830489] ? ext4_map_blocks+0x5a0/0x19e0 [ 955.834823] ext4_map_blocks+0x7af/0x19e0 [ 955.838957] ? ext4_issue_zeroout+0x180/0x180 [ 955.843436] ? __brelse+0x84/0xa0 [ 955.846878] ? __ext4_new_inode+0x2eb/0x5e40 [ 955.851291] ext4_getblk+0xad/0x510 [ 955.854911] ? ext4_iomap_begin+0xf40/0xf40 [ 955.859216] ? ext4_free_inode+0x18d0/0x18d0 [ 955.863604] ? __dquot_initialize+0x2b2/0xd40 [ 955.868103] ext4_bread+0x7c/0x210 [ 955.871626] ? ext4_getblk+0x510/0x510 [ 955.875498] ? dquot_initialize_needed+0x290/0x290 [ 955.880464] ? security_transition_sid+0x142/0x1b0 [ 955.885373] ? security_transition_sid+0x10b/0x1b0 [ 955.890298] ext4_append+0x177/0x390 [ 955.894006] ext4_mkdir+0x33a/0xdd0 [ 955.897658] ? ext4_init_dot_dotdot+0x620/0x620 [ 955.902377] vfs_mkdir+0x45b/0x730 [ 955.905944] do_mkdirat+0x262/0x2d0 [ 955.909553] ? __ia32_sys_mknod+0x120/0x120 [ 955.913956] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 955.919107] ? do_syscall_64+0x21/0x670 [ 955.923064] do_syscall_64+0xf9/0x670 [ 955.926908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 955.932112] RIP: 0033:0x45d277 [ 955.935286] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 955.954165] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 955.961852] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 955.969111] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 955.976365] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 955.983614] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 955.990862] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:18 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:18 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000100)=0xb0000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) openat$cgroup_type(r3, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) dup2(r1, r2) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x0, 0x9, 0xb8, 0x5, 0x20, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8, 0x1, 0x9, 0xfff}}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:18 executing program 4 (fault-call:3 fault-nth:32): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6b6b6b00000000, &(0x7f0000000040)) 18:42:18 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x1, 0x8000) accept$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host, 0x1}) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) ioctl$TIOCSERGETLSR(r3, 0x5459, &(0x7f0000000240)) write$char_raw(r2, &(0x7f0000000400)={"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"}, 0x400) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000100)=0x5) 18:42:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:18 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20000, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000005280)={'syztnl2\x00', &(0x7f00000051c0)={'syztnl0\x00', 0x0, 0x700, 0x7, 0x401, 0x5, {{0x23, 0x4, 0x2, 0x11, 0x8c, 0x64, 0x0, 0x20, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x31}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0xb, 0xfffffffffffffff8, [{0x6, 0x2}, {0x1, 0x3, '/'}]}, @timestamp_addr={0x44, 0x44, 0x9a, 0x1, 0xf, [{@dev={0xac, 0x14, 0x14, 0xc}}, {@local, 0x8}, {@private=0x1, 0x3}, {@loopback, 0x8}, {@empty, 0x2}, {@rand_addr=0x64010102}, {@dev={0xac, 0x14, 0x14, 0xc}}, {@multicast1, 0x5ed}]}, @rr={0x7, 0x13, 0x40, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @multicast1]}, @ssrr={0x89, 0xb, 0x66, [@rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ssrr={0x89, 0xb, 0xe8, [@loopback, @broadcast]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000007940)={'batadv0\x00', 0x0}) sendmmsg$inet(r1, &(0x7f0000007e80)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000140)="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", 0x1000}], 0x1, &(0x7f0000001180)=[@ip_tos_int={{0x14}}], 0x18}}, {{&(0x7f00000011c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001300)=[{&(0x7f0000001200)="43239c84cae1c9e0f3a1400051b5ca243c0d89c1a9a49638560937d13648a6c9dbbd4797430b0dcab81715f42e34cd92d07ac5d974d14493e907992ce0cb4b30bf866595f60045c5124a3b6de82ab35ee0143a3c9439e37fec76244d6ea6f27f2fbd049e095f037e03225a7b943d7df188d6323b9d210d31b31ca0586cfe4923daefb5d5c9c8273deeded0c177935b30a5ac15ad82ad14ed48de581285966abe36cc19d880656a0fd749211a16fe4f95d8298d6bb2128a9b9e9a9ad254842e9ee07f6b3881b8d6a36394a19273231ab81046eba3ccac9240b40528bdc28a50e9be1c2b7b0b22a224f9dbf445fda59eae187a73ac", 0xf4}], 0x1, &(0x7f0000001340)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}], 0x30}}, {{&(0x7f0000001380)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f00000017c0)=[{&(0x7f00000013c0)="b249917a03b96e50ccb20f2f112f420569abaf4d32a7b8028f438eb1d2144a6e0c00f8b19ef24cb5ec41af6d1722f1782031a61c8badd3aed12f0a16fe80635df8cb6c51e2312ba4be6d365f39ffd37f16b58084b58f7e6aa26ef1eee0f9913af504753a2261e8343c8bf0b6323bcbb983f7ebb042797f30c32050404a6240a82993291c5be50c7c9f599988ac61ae12afaf9687ab5ba2316599562caab381be4d63115bb2f8e86b47cea4", 0xab}, {&(0x7f0000001480)="fcb53d0851390ffcbac28486684fd3747c82e0436b27ee7c1d664fa28624255dcb7fb1a4ee57b39bc1f50753290728c85fdbcf77237fc8097f4a0e7b1557285161d6cd3e39718d35bfa5e737e9aa14e5d01eee8f6a6bd2a5b4bba4c16358fa4100a4bea378d8ee6eed2b87b149435291ec075b0df3", 0x75}, {&(0x7f0000001500)="180dfa689ec06e230ce9861497c68a2902a883d404ae2785aa03b0fd369a5fae4a5878b2f9ea0aa0c064aead95908defbaed4e63036fb64236a4b55e5c495f73d616adad7cbba6f70f866829d1080a9c27c1a90ecf839f3ad4f8994e421b70c8de1427c3651553949dad91544787fd70204811d93c18", 0x76}, {&(0x7f0000001580)="fb8055a216b6685f403bc59cd52fcd0dfc528ae003e3882a230969dbd59c971555213b527413feb2908b4caea63eb1453dfa749f9bcc9b91cbe9fcb7736d03b6dd05470fad8e7fb59a766cbe39df71e97af2cdc7b857f197eafc2105b1f5c3eb342a526dd7510ca1f826a00e8c0da887639211a9227c199058885054a30cff69bd6648f36296", 0x86}, {&(0x7f0000001640)="36a9536e3c2d85320401aca22a2ce9c44d10ef5de39b02c0bd82f354cf8b3d5b390b07289f4784900ed6af1ed4ee3ce0d62fd325cddb4c72ad4027984afb3f869f5d92159ef848a05065ab8ef1177565593b5f4ed0f1661c8660db70fb56511303587be7a691b2f529", 0x69}, {&(0x7f00000016c0)="c94376b04432d96496b7f29578fda52ab92915deb54739751848a29cb100d958a535d301ae2db37dcec1070300c8c40265ccbc67aff91f0e116850994c0ceb94ee922f75b0dc8df8087e5a6fd02391fb81d9183124828564d51c16658d9bcfba0830b11a34cc9868ec602f37dd032879b13f5ddfb8a00a8027f278283c7b8b7cd40bce267e8fefe100892a68a7fd39989e9a80dffb0e757901d77e1b62559fa6fe5800a1bd60b17b369c0955a9288174abaa76f83f636818ae4571cffff7f4808a8f30249222b51b0d7065731f", 0xcd}], 0x6, &(0x7f0000001840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x8b83}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x50}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="852012649c8332a6bf2c760da248f3c2b995ccf97ef08dcc0a6a58e85760b0177e465e8e59b3208b149624f6537c28bc7bce8d52a0d7a2e5c5bd70087961f93b496a7f942ec797c16b9ab44a6ba1b69b95702681b7bb0279a051fdde3859d46a076cce08e85df245069baf2176d2c21eb6d10319b93649229e6fb3f5554949a806243328a6d7c7474e3987934433ace00ec2a7e9cca231f20ba23e7eb19163b4bb190186ad84762f66f7981b6b4e500508a3d34e2a4e8411556e4172561eea7aef00fb5e6681885300c8d8", 0xcb}, {&(0x7f00000029c0)="6b8eecfc3d8f77c7e73d75e55374efd45ca0935033ca9e24bfec12fae7ea049ffc1830b8c290dd0c79d3", 0x2a}, {&(0x7f0000002a00)="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", 0x1000}], 0x4, &(0x7f0000003a40)=[@ip_retopts={{0x118, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xdd, 0x1, 0x2, [{@empty, 0xffffffff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}]}, @noop, @cipso={0x86, 0x63, 0x2, [{0x0, 0x3, "be"}, {0x6, 0x9, "6b3baa86a8a775"}, {0x7, 0x9, "8ed82b3d627677"}, {0x0, 0x9, "92d8debe1b49e7"}, {0x6, 0x12, "1d125fa69c997de8bfc29eaaaf36473d"}, {0x6, 0x5, "f87da1"}, {0xa, 0xd, "893d7f3c5532fb308efb2c"}, {0x0, 0x6, "08a37c35"}, {0x7, 0xe, "3b7e04c7f3065c0bdf391a93"}, {0x6, 0x7, "79239dd354"}]}, @noop, @timestamp_prespec={0x44, 0x44, 0x63, 0x3, 0x2, [{@remote}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x100}, {@local, 0x1000}, {@dev={0xac, 0x14, 0x14, 0x40}, 0x5e56}, {@empty, 0x6}, {@multicast1, 0x4}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@multicast2, 0xffffffff}]}, @generic={0x7, 0x2}, @lsrr={0x83, 0xb, 0x6, [@broadcast, @remote]}, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x7, [{@empty, 0xf5}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x8c1}, {@dev={0xac, 0x14, 0x14, 0x32}, 0x7}, {@multicast1, 0xfffffffe}, {@local, 0x100}, {@multicast1, 0x7}, {@multicast2, 0xffffffe1}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @rand_addr=0x64010101}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @loopback}}}], 0x188}}, {{0x0, 0x0, &(0x7f0000003c40)=[{&(0x7f0000003c00)="40912f99390d5ba771a2ea9456c886b3bc45862b082002de", 0x18}], 0x1, &(0x7f00000052c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x101}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast1, @broadcast}}}], 0x80}}, {{&(0x7f0000005340)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000067c0)=[{&(0x7f0000005380)="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", 0x1000}, {&(0x7f0000006380)="230ce06d9fdd4e1058eec1130533b5754254ad372d88e8c2400fc8eb8f23e001919882800b0f03983700ce646c3eff1e8464a7d5a2888a3dfcdace8d5e497ef0dd2d52e53949d682a28022e1a2a1e9c8abd11d747940fea22418644cf14fdc99e4745a5d349e12cf87771872505b8d736795e51f72f7d8bc5f8ff74d9bc7f44dd9682a9eaa9e31559f0b943747e93c5dfdb306", 0x93}, {&(0x7f0000006440)="8d7b1d8f629c7a59ac578906321defe6f14fca5526912cb2e5052214dc4904c816d289478be1cdd05aeda977d2bfcff77f3b743232866114adecd6324135b20fc8b2b4fde0bea19bf3011a301cbe565fd5927a8185e27e98cdbbdf462c81d6648d783496b6ae61900d70c1ce3691169bf97ffaaa062806bfb14acaab302103ed49c00f84fdc0215ee49deb2859d7983e3b7fea72a4b5c97888d810a9dd7d4e3bd58cf9bb99f6c5eede37f04c79b0a0770a385afe1ba7715d779c806ae9f8398130d3a377ce0684f17560f36da27491ca735981989c0e85b2dec89b6ffa2ff8db124f631d43f6c4c94f72f445d3b0d343e494cc39a5e3ad64", 0xf8}, {&(0x7f0000006540)="001347f070fdd6d22b8ce94f8f4c3f71d1deac3a52696cce3a023480469a2388ae5aca378a0aa8267c8802dbd2912aaa60dac88735cb797f511f19ad10987967f66a2b30b11d6b939c375ccdf851a8daba5e33ab3fb840b6f4b986fd40b96ca26efec5e968580f4a74d0ce3084c873a0cf0fa779e4cfd696ff25f47d468202fe204fecc582e3388f373d6bb4fcc9253819ec9af8fd19ddc6856ca3c6a54a1cab4dae75f620948762478513b8addeb0e85415", 0xb2}, {&(0x7f0000006600)="f86b816509f56fef95887bb6f574f87f8d9a20be3ea30d6ef09aa860d888d5889288c1658ad3393966b8b4a0a5d0fd7a8db4684a832b3165b36f601eef063efc73494f3281b035c3e7d3d79c1b75385e80e16e9ac7032c2b55e2d5", 0x5b}, {&(0x7f0000006680)="90c7f3a057f50c2f8b3957f7118e4557ed38f58e853387f4845cdf7e98e30c8e68495a91203eeed85e6845f8bf90804dc05ff12a09779fbae1a25d71e1929415ca6207bc7728d37f450a554e", 0x4c}, {&(0x7f0000006700)="572c39bad6cf199133dfa9974273d48cedabdbb823647106fc80168aeb877c1913708fb6581e22e1f2c5d8342b79d0e01fe444bd576ac2bd9e8061e99f58794e9fa9c1b0cddaa7440e3fb9a6654cc80b05d5ccb30e08e82a04ac8668bef614d5ec50bfd32c0138146a867d605757b1480c0ff1ff884526e64463bfb8bb46d881db751e48a10cbf25ac311ed751e10e783e0e39f97726", 0x96}], 0x7, &(0x7f0000007980)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7323}}, @ip_ttl={{0x14, 0x0, 0x2, 0x100}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @multicast2}}}], 0x50}}, {{&(0x7f0000007a00)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000007dc0)=[{&(0x7f0000007a40)="c499720ae45c5077d1c6bd6f1c351f9ecaacbf6c73b9db1fd1ec1dc792448adcc03116b47d0b999e397f6be550204425d394a01c82883ca5591c18245863900f4e79d671a905e31128e8978a6eec4141a0b816bedd55ca2ad9d92461f01ece69ced5784a88348360a28b1b55df39a7a1f3f08a54289dec05d93a", 0x7a}, {&(0x7f0000007ac0)="2638945bd5a727f477f1428c960585871212", 0x12}, {&(0x7f0000007b00)="a453f87b21691e089c1070cd73f75a71e3c1edff6ee00142f1adae3e0a4761818582821321f22a460f0595b5ad776ef06b0a08", 0x33}, {&(0x7f0000007b40)="f2b0d372d6706a0e44f722a35ab6b3693906039d", 0x14}, {&(0x7f0000007b80)="de9fe5b51079f61cf7448740c2e95956b8eefdbba367f1e7d24ce8743efbf4bfcd189f4eeeeacd841c13f4f7a28116aa8ff37ff4aa05887851b3ba340ffabc448de865fc7852f0bfd05d5be053546f1b17b37504587cc52cb90463aa530cae02526cd7f09fc32adff845a8103ec3f6ed364856d8a2dd6693c0b2cbfbd85a80b4a91db0665d3c12c45da6d56005f2b771afb44baf6358c9989319aeec067bbac0f8c9412590a274e269a242965bd20d49b4116c9d24363af0da83d944275a", 0xbe}, {&(0x7f0000007c40)="af9333f1dcaeb64099c1af715c6d1dff679eba1b897bfa85569b46ac94167c18cbaa3704fc5d59b4b717a26249e247d6d0dfaf6f46", 0x35}, {&(0x7f0000007c80)="4337f0fcabe8b1f3b7a3d996b85a790d", 0x10}, {&(0x7f0000007cc0)="27db39ec733f9bf5c930c9c8b2d23e5df6781ab04f4da4468f4bae8d6af7573b1f7f29be3301b52a0fe66b6e52c2b94724ff2dac9b37e5a7fad22edcd25d44fe5cf2365e5da9c1f9046c3e81cfdacc0d3aebf740406ea534d2f2b7b4b356535411439d5c758a5a621026706bc8f39c79c73c0f71b1cfba60bdfe2edd6486703a170e7a1e7e56dc1cda161832954ac39cf34a7d9431e1cbff2c6ef168d113", 0x9e}, {&(0x7f0000007d80)="26c0e0938c695da818df1a3b86bb67efbe621c972ee7de47291a4c19c21b63b2149c7d35eec5511047a7d88f19bd229f902bd7ecd4dfe842500ddc9c11", 0x3d}], 0x9}}], 0x7, 0x80) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 956.274044] FAULT_INJECTION: forcing a failure. [ 956.274044] name failslab, interval 1, probability 0, space 0, times 0 [ 956.317389] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 956.340924] CPU: 1 PID: 3930 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 956.348745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.351070] EXT4-fs (loop3): group descriptors corrupted! [ 956.358096] Call Trace: [ 956.358118] dump_stack+0x22c/0x33e [ 956.358139] should_fail.cold+0xa/0x2f [ 956.373732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 956.378846] ? lock_acquire+0x170/0x3f0 [ 956.382809] __should_failslab+0x153/0x1b6 [ 956.387028] should_failslab+0x5/0xf [ 956.390743] __kmalloc+0x2dd/0x4f0 [ 956.394263] ? ext4_find_extent+0x9be/0xc70 [ 956.398568] ext4_find_extent+0x9be/0xc70 [ 956.402705] ext4_ext_map_blocks+0x1c0/0x7340 [ 956.407201] ? __lock_acquire+0x6ec/0x3ff0 [ 956.411433] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 956.416454] ? mark_held_locks+0xf0/0xf0 [ 956.420511] ? __ext4_handle_dirty_metadata+0x1e0/0x650 [ 956.425854] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 956.431029] ? mark_held_locks+0xf0/0xf0 [ 956.435073] ? ext4_mark_iloc_dirty+0x17ae/0x2b70 [ 956.439896] ? find_held_lock+0x2d/0x110 [ 956.443954] ? ext4_es_lookup_extent+0x375/0xba0 [ 956.448710] ? find_held_lock+0x2d/0x110 [ 956.452764] ? ext4_map_blocks+0x5a0/0x19e0 [ 956.457074] ? lock_acquire+0x170/0x3f0 [ 956.461032] ? ext4_map_blocks+0x74d/0x19e0 [ 956.465339] ext4_map_blocks+0x7af/0x19e0 [ 956.469474] ? ext4_issue_zeroout+0x180/0x180 [ 956.473950] ? __brelse+0x84/0xa0 [ 956.477383] ? __ext4_new_inode+0x2eb/0x5e40 [ 956.481774] ext4_getblk+0xad/0x510 [ 956.485381] ? ext4_iomap_begin+0xf40/0xf40 [ 956.489686] ? ext4_free_inode+0x18d0/0x18d0 [ 956.494072] ? __dquot_initialize+0x2b2/0xd40 [ 956.498548] ext4_bread+0x7c/0x210 [ 956.502066] ? ext4_getblk+0x510/0x510 [ 956.505930] ? dquot_initialize_needed+0x290/0x290 [ 956.510841] ? security_transition_sid+0x142/0x1b0 [ 956.515750] ? security_transition_sid+0x10b/0x1b0 [ 956.520664] ext4_append+0x177/0x390 [ 956.524374] ext4_mkdir+0x33a/0xdd0 [ 956.527997] ? ext4_init_dot_dotdot+0x620/0x620 [ 956.532675] vfs_mkdir+0x45b/0x730 [ 956.536202] do_mkdirat+0x262/0x2d0 [ 956.539823] ? __ia32_sys_mknod+0x120/0x120 [ 956.544133] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 956.549224] ? do_syscall_64+0x21/0x670 [ 956.553183] do_syscall_64+0xf9/0x670 [ 956.556970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 956.562138] RIP: 0033:0x45d277 [ 956.565327] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 956.584216] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 956.591907] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 956.599159] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 956.606408] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 956.613657] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 956.620910] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:19 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host, 0x2}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x410000, 0x0) ioctl$KVM_GET_API_VERSION(r3, 0xae00, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xb0000000000000, &(0x7f0000000040)) 18:42:19 executing program 4 (fault-call:3 fault-nth:33): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:19 executing program 2: setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000005480)={0x0, @in6={{0xa, 0x4e21, 0x7f, @remote, 0x5ae}}, 0x800, 0x1000, 0x2, 0x3ff, 0x90, 0x6, 0x3}, 0x9c) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000000180)=""/239, 0xef}], 0x2, &(0x7f00000002c0)=""/75, 0x4b}, 0x6}, {{&(0x7f0000000340)=@ax25={{0x3, @default}, [@rose, @netrom, @bcast, @default, @null, @bcast, @bcast, @null]}, 0x80, &(0x7f0000001700)=[{&(0x7f00000003c0)=""/132, 0x84}, {&(0x7f0000000480)=""/103, 0x67}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/223, 0xdf}, {&(0x7f0000001640)=""/131, 0x83}], 0x6}, 0x3}, {{&(0x7f0000001780)=@caif=@util, 0x80, &(0x7f00000028c0)=[{&(0x7f0000001800)=""/175, 0xaf}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x2, &(0x7f0000002900)=""/229, 0xe5}, 0xf88a}, {{&(0x7f0000002a00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000004c40)=[{&(0x7f0000002a80)=""/83, 0x53}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/220, 0xdc}, {&(0x7f0000003c00)=""/4096, 0x1000}, {&(0x7f0000004c00)=""/43, 0x2b}], 0x5, &(0x7f0000004cc0)=""/63, 0x3f}, 0x9}, {{&(0x7f0000004d00)=@nfc, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d80)=""/143, 0x8f}], 0x1, &(0x7f0000004e80)=""/166, 0xa6}, 0x6}, {{&(0x7f0000004f40)=@nfc_llcp, 0x80, &(0x7f0000005180)=[{&(0x7f0000004fc0)=""/133, 0x85}, {&(0x7f0000005080)=""/210, 0xd2}], 0x2, &(0x7f00000051c0)=""/223, 0xdf}, 0x3}], 0x6, 0x2, 0x0) connect$inet6(r0, &(0x7f0000005440)={0xa, 0x4e24, 0x10000, @dev={0xfe, 0x80, [], 0x35}, 0x7}, 0x1c) 18:42:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x100000000000000, &(0x7f0000000040)) [ 956.881972] FAULT_INJECTION: forcing a failure. [ 956.881972] name failslab, interval 1, probability 0, space 0, times 0 [ 956.941076] CPU: 0 PID: 3960 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 956.948905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.958260] Call Trace: [ 956.960857] dump_stack+0x22c/0x33e [ 956.964589] should_fail.cold+0xa/0x2f [ 956.968506] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 956.973626] ? lock_acquire+0x170/0x3f0 [ 956.977616] __should_failslab+0x153/0x1b6 [ 956.981866] should_failslab+0x5/0xf [ 956.985587] __kmalloc+0x2dd/0x4f0 18:42:19 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f0000000140)={0x4, 0x40, 0xffffffe1, 0x9, 0x8, 0xff, 0x49, 0x9, 0x40, 0x6, 0x6, "926718bb56b4e8aab8ed5e73d1a655d5e50ab0f9969a3c5c5ce33370cbeb0c95"}) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r3) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@hyper, 0x2000000}, 0x1, 0x0, 0x3}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000004c0)=ANY=[@ANYBLOB="730000000000000000000000000000000000000000000016000000000000000000000000000000000000000000000000000000000000002c701e1b83db8e9f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000898568fe4cbd0f40509ef74a546eaafa109610d3d0c13ef4cd"]) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="204b64cdf374260000001980e0d2dc26e1e058990c9e052b3aca955fd76754b6c2aef850ebbc69f4012b38f3a98f99c22c38f8ad24a05855df27e9457eceb233bd34020875df43104abb78a40638244ccb675224e2d4569ff874373e5dacd5f012da42aa2a2d04db289c15e45eb490caa9b10313932c1341bdfdc32a68b6e8420d1482cd99106f10", @ANYRES64], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x7a, &(0x7f00000000c0), &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0xba, 0x6, 0x0, 0x3ff, 0x20, 0x1, 0xff}, &(0x7f0000000100)=0x9c) sendto$inet(r2, &(0x7f0000000300)="e250084f7f897e5ade890ffdfe651e41badd3251d96bda6dfe91a8415963dc18554739636ec3d2553536793a7a8d8be8d3266808a1805c66c79b82244c0793b5c3acc90316a8cc840e15ffed2fbb67ac6892071bcdf91fad9313e51c7ec4a090511740f14d2c2a32c2b8515e782b6cfe9ba5883583d3fd61de972b70ba962c6297b635a27aaf846eaa265e0809ed87adf8a3d4f1591f242236556e56ca1e5f734f8475a3631bfcba4ae15727c27f423d622a7963883bf9049d1b5f4464c3d236310abff904d00a9aac39e153f324eb4c219fb3b3b4cad4fa92b5e0", 0xdb, 0x4040000, 0x0, 0x0) [ 956.989217] ? ext4_find_extent+0x9be/0xc70 [ 956.993549] ext4_find_extent+0x9be/0xc70 [ 956.997717] ext4_ext_map_blocks+0x1c0/0x7340 [ 957.002228] ? __lock_acquire+0x6ec/0x3ff0 [ 957.006477] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 957.011507] ? mark_held_locks+0xf0/0xf0 [ 957.015575] ? __ext4_handle_dirty_metadata+0x1e0/0x650 [ 957.020951] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 957.026151] ? mark_held_locks+0xf0/0xf0 [ 957.030221] ? ext4_mark_iloc_dirty+0x17ae/0x2b70 [ 957.035073] ? find_held_lock+0x2d/0x110 18:42:19 executing program 2: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x10b, 0x2, 0x0, "8e86444efca4366f1e0b509d3d048e71", "8b476f9b81aa7d9e471defec8e4d58b784261e635b89acaa59c5871266f49abfbca7295154d683a4ed5206a45d0032f6c4800a5b575e3e2ff7c7cc4af9e892746768044304870eb4728dfc18119c64062854b8decb1e3ef8a5b2e27376dcc5ac721dbfade5ff35700914f8548886d912ab7c63222f7f18f91c466f3eb06fcdc27ccf51a69d25bf06b512aa58cb905c4a447864f1422ff0859f922aada2d09274f5e27b8820c174e327b4af52917a14723c1003d1b12e8e92c0686faa94e2ab2f5358bcdd64b36c730ca3169ea5dd689fbdf65cc0209b4aece1425fe78464d7865cba42cdef8a6ea65336db9a9ddf0976f7e2ab60bbaf"}, 0x10b, 0x0) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) mmap$usbfs(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x80010, 0xffffffffffffffff, 0x9) [ 957.039146] ? ext4_es_lookup_extent+0x375/0xba0 [ 957.043912] ? find_held_lock+0x2d/0x110 [ 957.047983] ? ext4_map_blocks+0x5a0/0x19e0 [ 957.052317] ? lock_acquire+0x170/0x3f0 [ 957.056299] ? ext4_map_blocks+0x74d/0x19e0 [ 957.060641] ext4_map_blocks+0x7af/0x19e0 [ 957.064811] ? ext4_issue_zeroout+0x180/0x180 [ 957.069313] ? __brelse+0x84/0xa0 [ 957.072774] ? __ext4_new_inode+0x2eb/0x5e40 [ 957.077192] ext4_getblk+0xad/0x510 [ 957.080827] ? ext4_iomap_begin+0xf40/0xf40 [ 957.085158] ? ext4_free_inode+0x18d0/0x18d0 [ 957.089570] ? __dquot_initialize+0x2b2/0xd40 [ 957.094080] ext4_bread+0x7c/0x210 [ 957.097629] ? ext4_getblk+0x510/0x510 [ 957.101527] ? dquot_initialize_needed+0x290/0x290 [ 957.106470] ? security_transition_sid+0x142/0x1b0 [ 957.111408] ? security_transition_sid+0x10b/0x1b0 [ 957.116351] ext4_append+0x177/0x390 [ 957.120079] ext4_mkdir+0x33a/0xdd0 [ 957.123726] ? ext4_init_dot_dotdot+0x620/0x620 [ 957.128417] vfs_mkdir+0x45b/0x730 [ 957.131968] do_mkdirat+0x262/0x2d0 [ 957.135599] ? __ia32_sys_mknod+0x120/0x120 [ 957.139930] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 957.145043] ? do_syscall_64+0x21/0x670 [ 957.149032] do_syscall_64+0xf9/0x670 [ 957.152851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.158047] RIP: 0033:0x45d277 [ 957.161247] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 957.180147] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 957.187863] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 957.195137] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 957.202409] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 957.209683] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 957.211324] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 957.216951] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 957.235880] EXT4-fs (loop3): group descriptors corrupted! 18:42:19 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_mount_image$sysv(&(0x7f0000000100)='sysv\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000180)="cc60c47821da3c7313cab5f0bd74d66e9f74c98ce42c484b86e8f3bb69d525e77b3d8c356699d0b67ffdd831c4c265a52b8dd10caba068a19b870a27faa62e5597bcba99763269143c667582312cfbdf1e47a1fa131a7a07684503413b9aa39b54ed70d2907949", 0x67, 0x1}, {&(0x7f0000000200)="3be8904652fe41db251f50fb9efd392181fabbaf297b11c9d88d", 0x1a, 0x4}, {&(0x7f0000000240)="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", 0xfb, 0x3b}, {&(0x7f0000000340)="9b080ee1e92a423203966f2cc7d1bfe3964fd811cfde302bbe9afbc49de226de218559b33bde7b4f2a97e8b141a5cf2dcd496c0abca267efd12e05f0b7f67f5d1769f107835b4bcf6582169d84d6a8699a88e0fe377abebf46fba2943ae47e5f6ae111", 0x63, 0xffffffff}, {&(0x7f00000003c0)="c1ae07d03d2c2cdfa945f14d0f11a1bf87cd1175af285f9c46c7330e0d218295d2744df5d9d63dab485493df37205881724e6fa58b3891102960fc2816aa8d2aef10d88a79a145630d9b6fd1e95071adb21e4d8788920faa46b72d1b411edcd10f10c48d7cdcf3d932c21786dc6e7fbe2ecb3157d52708e7b3c9efbe6f950e4c6834ff0ef8f8f54e9ea49d6540a94309a12018db21e92dafc1a6120a6aac9493fc413c63dace72221e50a0c56430914f4b0e72b9f6b1c9df7914e27167593d97188b53f86f9bce1db5c1", 0xca, 0xfffffffffffffffd}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="2f6465762f766d6369002c282c2e2ce55b2c2f6465762f766d6369002c2c2c2f6465762f766d6369002c2c2f6465762f03000000002c2f6465762f766d6369002c7375626a5f757365723d2f6465762f766d6369002c736d61636b66736861743d2f6465762f766d6369002c7375626a5f747970653d5d2925392a295b2c00"]) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1b0000000000000, &(0x7f0000000040)) 18:42:19 executing program 4 (fault-call:3 fault-nth:34): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 957.464638] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 957.496862] FAULT_INJECTION: forcing a failure. [ 957.496862] name failslab, interval 1, probability 0, space 0, times 0 [ 957.500252] EXT4-fs (loop3): group descriptors corrupted! [ 957.509477] CPU: 1 PID: 4007 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 957.522079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.531435] Call Trace: [ 957.534028] dump_stack+0x22c/0x33e [ 957.537674] should_fail.cold+0xa/0x2f [ 957.541558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 957.546645] ? __es_remove_extent+0x47a/0x750 [ 957.551130] __should_failslab+0x153/0x1b6 [ 957.555357] should_failslab+0x5/0xf [ 957.559063] kmem_cache_alloc+0x43/0x4a0 [ 957.563154] __es_insert_extent+0x2be/0xf50 [ 957.567473] ext4_es_insert_extent+0x22e/0x600 [ 957.572045] ? ext4_map_blocks+0x5a0/0x19e0 [ 957.576359] ? ext4_es_find_delayed_extent_range+0xa10/0xa10 [ 957.582212] ext4_map_blocks+0xa37/0x19e0 [ 957.586376] ? ext4_issue_zeroout+0x180/0x180 [ 957.590856] ? __brelse+0x84/0xa0 [ 957.594349] ? __ext4_new_inode+0x2eb/0x5e40 [ 957.598789] ext4_getblk+0xad/0x510 [ 957.602412] ? ext4_iomap_begin+0xf40/0xf40 [ 957.606724] ? ext4_free_inode+0x18d0/0x18d0 [ 957.611118] ? __dquot_initialize+0x2b2/0xd40 [ 957.615600] ext4_bread+0x7c/0x210 [ 957.619129] ? ext4_getblk+0x510/0x510 [ 957.623007] ? dquot_initialize_needed+0x290/0x290 [ 957.627962] ? security_transition_sid+0x142/0x1b0 [ 957.632879] ? security_transition_sid+0x10b/0x1b0 [ 957.637795] ext4_append+0x177/0x390 [ 957.641510] ext4_mkdir+0x33a/0xdd0 [ 957.645135] ? ext4_init_dot_dotdot+0x620/0x620 [ 957.649792] vfs_mkdir+0x45b/0x730 [ 957.653316] do_mkdirat+0x262/0x2d0 [ 957.656927] ? __ia32_sys_mknod+0x120/0x120 [ 957.661235] ? trace_hardirqs_off_caller+0x1b5/0x210 [ 957.666331] ? do_syscall_64+0x21/0x670 [ 957.670290] do_syscall_64+0xf9/0x670 [ 957.674074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 957.679243] RIP: 0033:0x45d277 [ 957.682423] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 957.701345] RSP: 002b:00007fa359855a88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 957.709033] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 000000000045d277 [ 957.716288] RDX: 0000000000000006 RSI: 00000000000001ff RDI: 0000000020000100 [ 957.723549] RBP: 00007fa359855ae0 R08: 0000000020000218 R09: 0000000000000000 [ 957.730807] R10: 0000000000002000 R11: 0000000000000213 R12: 0000000020000000 [ 957.738067] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x200000000000000, &(0x7f0000000040)) 18:42:20 executing program 4 (fault-call:3 fault-nth:35): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 957.840546] VFS: unable to find oldfs superblock on device loop2 18:42:20 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000100)) 18:42:20 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) prctl$PR_GET_TIMERSLACK(0x1e) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x420000, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r3, 0x7a0, &(0x7f0000000100)={@my=0x1, 0x2}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:20 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x329040, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000e00)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000019c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_FRAME={0x26, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_a, @from_mac}}, @sp_mp_open={0xf, 0x1, {0x0, {}, @void, @void}}}}]}, 0x44}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r3, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x5, 0x59}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x40044}, 0x4) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x3, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r6, 0xc0585604, &(0x7f0000000140)={0x1, 0x0, {0x5, 0x702, 0x100b, 0x6, 0x0, 0x3, 0x3, 0x7}}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 957.994340] FAULT_INJECTION: forcing a failure. [ 957.994340] name failslab, interval 1, probability 0, space 0, times 0 [ 958.013052] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 958.018712] CPU: 1 PID: 4042 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 958.030141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.039499] Call Trace: [ 958.042098] dump_stack+0x22c/0x33e [ 958.043184] EXT4-fs (loop3): group descriptors corrupted! [ 958.045748] should_fail.cold+0xa/0x2f [ 958.045769] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 958.045784] ? lock_acquire+0x170/0x3f0 [ 958.045825] __should_failslab+0x153/0x1b6 [ 958.068503] should_failslab+0x5/0xf [ 958.072204] __kmalloc_track_caller+0x2d8/0x4e0 [ 958.076867] ? strndup_user+0x70/0x120 [ 958.080765] ? do_syscall_64+0x207/0x670 [ 958.084839] memdup_user+0x22/0xb0 [ 958.088387] strndup_user+0x70/0x120 18:42:20 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='gid_map\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 958.092168] ksys_mount+0x34/0x130 [ 958.095729] __x64_sys_mount+0xba/0x150 [ 958.099710] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 958.104297] do_syscall_64+0xf9/0x670 [ 958.108107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 958.113296] RIP: 0033:0x4608aa [ 958.116494] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 958.135395] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 958.143095] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 958.150355] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 958.157604] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 958.164852] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 958.172102] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000110c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x300000000000000, &(0x7f0000000040)) 18:42:20 executing program 4 (fault-call:3 fault-nth:36): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="03000000040000", 0x7, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:20 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x40, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000140)={0x20003062, 0x9, 0xffefffee, 0xbf26, 0xd19, 0x104}) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:20 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r0, r1) connect$vsock_dgram(r0, &(0x7f0000000100)={0x28, 0x0, 0x100000001, @local}, 0x10) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}}) socket$caif_stream(0x25, 0x1, 0x1) 18:42:20 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) syz_80211_inject_frame(&(0x7f00000001c0)=@device_b, &(0x7f0000000200)=@ctrl_frame=@pspoll={{}, @random, @initial, @broadcast}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x82180, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f00000002c0)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x60, 0x2, 0x7, 0x301, 0x0, 0x0, {0x0, 0x0, 0x100}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xffcc}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x80}]}, 0x60}, 0x1, 0x0, 0x0, 0x20040800}, 0x24000000) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000240)) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80000) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000140)={{0x2e, @multicast2, 0x4e20, 0x1, 'sed\x00', 0x24, 0xfa0f, 0x55}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x10000, 0x401, 0x4, 0x6}}, 0x44) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000480)=""/33) 18:42:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x400000000000000, &(0x7f0000000040)) [ 958.410587] FAULT_INJECTION: forcing a failure. [ 958.410587] name failslab, interval 1, probability 0, space 0, times 0 [ 958.461692] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 958.480008] CPU: 0 PID: 4078 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 958.487833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.496390] EXT4-fs (loop3): group descriptors corrupted! [ 958.497276] Call Trace: [ 958.505398] dump_stack+0x22c/0x33e [ 958.509043] should_fail.cold+0xa/0x2f [ 958.512950] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 958.518066] ? lock_acquire+0x170/0x3f0 [ 958.522068] __should_failslab+0x153/0x1b6 [ 958.526313] should_failslab+0x5/0xf [ 958.530054] __kmalloc_track_caller+0x2d8/0x4e0 [ 958.534270] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 958.534724] ? strndup_user+0x70/0x120 [ 958.534746] ? do_syscall_64+0x207/0x670 [ 958.551863] memdup_user+0x22/0xb0 [ 958.555415] strndup_user+0x70/0x120 [ 958.559137] ksys_mount+0x34/0x130 [ 958.562691] __x64_sys_mount+0xba/0x150 [ 958.566673] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 958.571267] do_syscall_64+0xf9/0x670 [ 958.575083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 958.580288] RIP: 0033:0x4608aa [ 958.583491] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 958.602401] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 958.610125] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 958.617399] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 18:42:21 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) lstat(0x0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000440)='vD', 0x2}, {&(0x7f0000000540)="1e5d304d0487a2f807431fda57ee8c3083f3113cf8fd565e3b104a2cffc43cfebe5420ac28b38fd7a8afa573ee267c877bfffa82c7c03b44e8e5e09fa1638d6fef271a18266c163ffa70e72eba2c", 0x4e, 0x7}], 0x9000, &(0x7f0000000780)={[{@uid={'uid'}}, {@uid={'uid', 0x3d, r1}}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}, {@dir_umask={'dir_umask'}}, {@file_umask={'file_umask'}}, {@dir_umask={'dir_umask'}}], [{@measure='measure'}, {@context={'context', 0x3d, 'root'}}]}) lchown(&(0x7f0000000480)='./file0\x00', r1, r2) mount$9p_tcp(&(0x7f0000000240)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x40010, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@afid={'afid', 0x3d, 0x3f}}, {@uname={'uname', 0x3d, 'vcan0\x00'}}, {@privport='privport'}, {@loose='loose'}, {@noextend='noextend'}, {@nodevmap='nodevmap'}, {@cache_mmap='cache=mmap'}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@uid_lt={'uid<', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@euid_lt={'euid<'}}]}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40041, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f00000001c0)=0x7, 0x4) dup2(r3, r4) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000100)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:21 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400001, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000140)) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 958.624674] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 958.631947] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 958.639212] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010001f0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:21 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) socket$isdn(0x22, 0x3, 0x4) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:21 executing program 4 (fault-call:3 fault-nth:37): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x500000000000000, &(0x7f0000000040)) 18:42:21 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0xeaef, 0x111c40) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000500)=0xb0000) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000600)={'sit0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x2f, 0xfe, 0x5, 0x7, 0x10, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x20, 0x0, 0x3, 0x2}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x2c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x20}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_mount_image$hpfs(&(0x7f0000000140)='hpfs\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000200)="79cdaf97b0cd57a0a620ffd63724e776d7f418c8a00f5d8b7ca8a6970a661185f75708533f91121a6ec295f357a06861b2b609d18c738f", 0x37, 0x400}, {&(0x7f0000000240)="75ba4b82a55019e01476b8d5d3b4ee7574d0a8ecf2f6b1a358b1", 0x1a, 0xffffffffffffffff}, {&(0x7f0000000280)="6e18d853b980eab025cedaae6244db6299c064a03d5f1818c8fdb349f7ea5327603f5fe7d567785e357c5acae64e9b530c9c76577a7ba1866c40f2f1a3258a73d3d551c1fdbde0f1dfa88d52a5449740cb8e406f9e3a60313499f2bac753e5bc41895d31b5852d963696374f1573a71685665b516184b9b5970833470ffc", 0x7e, 0x80}, {&(0x7f0000000300)="821351cc1cfae7a44f13c2a33d28514dc4a14b3d6e6ad9908413a5d64611c90c8689ba60d68df690314ad7335e2d88768b60da9d928fcd3c72287f18b78f9f56449f8e99ac953852da4ffc71cc95929ddc2a2f9721a4ef71f126acdfadce652311605ab9e64468ccfd55830c229bcbd06027ba7fd3874ade1f40276ef5157f16995ecc9bafeaa7691af9a8e55027844e86fb929c337bf9d40e9c24f9bf3cc6ffb51ef944ec1e8ffa527adce33ebb5db824", 0xb1, 0x8001}], 0x10000, &(0x7f0000000440)={[{'/dev/vmci\x00'}, {'!^'}], [{@fsuuid={'fsuuid', 0x3d, {[0x35, 0x35, 0x37, 0x36, 0x33, 0x37, 0x31, 0x36], 0x2d, [0x30, 0xf, 0x33, 0x32], 0x2d, [0x38, 0x32, 0x62, 0x65], 0x2d, [0x56, 0x36, 0x61, 0x38], 0x2d, [0x65, 0x33, 0x0, 0x36, 0x32, 0x66, 0x31, 0x33]}}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_measure='dont_measure'}]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={r4, 0x1, 0x5}, 0x10) 18:42:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000200c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 958.954422] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 958.964138] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 958.986702] FAULT_INJECTION: forcing a failure. [ 958.986702] name failslab, interval 1, probability 0, space 0, times 0 18:42:21 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'wg2\x00'}, 0x18) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 959.009855] EXT4-fs (loop3): group descriptors corrupted! [ 959.066222] CPU: 0 PID: 4133 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 959.074048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.083403] Call Trace: [ 959.086013] dump_stack+0x22c/0x33e [ 959.089664] should_fail.cold+0xa/0x2f [ 959.093571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.098684] ? lock_acquire+0x170/0x3f0 [ 959.102679] __should_failslab+0x153/0x1b6 [ 959.105578] IPVS: Unknown mcast interface: wg2 [ 959.106919] should_failslab+0x5/0xf [ 959.106938] __kmalloc_track_caller+0x2d8/0x4e0 [ 959.106953] ? strndup_user+0x70/0x120 [ 959.106972] ? _copy_from_user+0xd2/0x130 [ 959.106987] memdup_user+0x22/0xb0 [ 959.107002] strndup_user+0x70/0x120 [ 959.107021] ksys_mount+0x6f/0x130 [ 959.107035] __x64_sys_mount+0xba/0x150 [ 959.107056] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 959.107073] do_syscall_64+0xf9/0x670 [ 959.151215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.156406] RIP: 0033:0x4608aa [ 959.159593] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 959.178477] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 959.186166] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 959.193425] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 959.200691] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 959.207952] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:42:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x600000000000000, &(0x7f0000000040)) [ 959.215214] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 959.233647] IPVS: Unknown mcast interface: wg2 18:42:21 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000080)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000220c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:21 executing program 4 (fault-call:3 fault-nth:38): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:21 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x7f, @empty}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @rand_addr=0x64010100}, 0x100, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000400)='macsec0\x00', 0x2, 0x40, 0x3}) r4 = dup2(r1, r3) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000540)) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000100)=0xa0000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@my=0x1, 0xffffff33}}) r5 = gettid() tkill(0x0, 0x5) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r4}, 0x8) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xffffd0c8, @loopback, 0x5}}}, 0x30) ptrace$setopts(0x4200, 0x0, 0x0, 0x100010) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f00000001c0)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000240)={0x1fac, 0x9, {r5}, {r7}, 0x8, 0x1ff}) [ 959.444599] FAULT_INJECTION: forcing a failure. [ 959.444599] name failslab, interval 1, probability 0, space 0, times 0 [ 959.456237] CPU: 1 PID: 4171 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 959.464046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.473407] Call Trace: [ 959.476007] dump_stack+0x22c/0x33e [ 959.479644] should_fail.cold+0xa/0x2f [ 959.483520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.488647] ? lock_acquire+0x170/0x3f0 [ 959.492607] __should_failslab+0x153/0x1b6 [ 959.496827] should_failslab+0x5/0xf [ 959.500521] kmem_cache_alloc+0x2b1/0x4a0 [ 959.504655] getname_flags+0xce/0x590 [ 959.508485] user_path_at_empty+0x2a/0x50 [ 959.512617] do_mount+0x14a/0x2f10 [ 959.516142] ? check_preemption_disabled+0x41/0x2b0 [ 959.521143] ? copy_mount_string+0x40/0x40 [ 959.525373] ? copy_mount_options+0x59/0x370 [ 959.529772] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 959.534792] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 959.539629] ? _copy_from_user+0xd2/0x130 [ 959.543778] ? copy_mount_options+0x261/0x370 [ 959.548281] ksys_mount+0xcf/0x130 [ 959.551813] __x64_sys_mount+0xba/0x150 [ 959.555768] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 959.560331] do_syscall_64+0xf9/0x670 [ 959.564115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.569282] RIP: 0033:0x4608aa [ 959.572455] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 959.591340] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 959.599031] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 959.606286] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 959.613543] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 959.620795] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 959.628132] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:22 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = gettid() tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) syz_open_procfs(r1, &(0x7f0000000240)='net/route\x00') ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6_vti0\x00', r4, 0x29, 0x3, 0x5, 0x8001, 0x10, @dev={0xfe, 0x80, [], 0x31}, @mcast2, 0x40, 0x7800, 0xfffffffe, 0x12ac589c}}) [ 959.653283] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 959.678085] EXT4-fs (loop3): group descriptors corrupted! 18:42:22 executing program 4 (fault-call:3 fault-nth:39): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 959.854534] FAULT_INJECTION: forcing a failure. [ 959.854534] name failslab, interval 1, probability 0, space 0, times 0 [ 959.866765] CPU: 0 PID: 4197 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 959.874579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.883930] Call Trace: [ 959.886526] dump_stack+0x22c/0x33e [ 959.890166] should_fail.cold+0xa/0x2f [ 959.894063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 959.899171] ? lock_acquire+0x170/0x3f0 18:42:22 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) bind$netrom(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @bcast, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x700000000000000, &(0x7f0000000040)) 18:42:22 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000180)={0x2, 0x101, 0x101, 0x731, 0x3ff, 0x6, 0x1f}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) [ 959.903187] __should_failslab+0x153/0x1b6 [ 959.907455] should_failslab+0x5/0xf [ 959.911193] kmem_cache_alloc+0x2b1/0x4a0 [ 959.915356] alloc_vfsmnt+0x23/0x780 [ 959.919082] vfs_kern_mount.part.0+0x27/0x470 [ 959.923589] do_mount+0x51c/0x2f10 [ 959.927143] ? check_preemption_disabled+0x41/0x2b0 [ 959.932169] ? copy_mount_string+0x40/0x40 [ 959.936418] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 959.941273] ? _copy_from_user+0xd2/0x130 [ 959.945433] ? copy_mount_options+0x261/0x370 [ 959.949962] ksys_mount+0xcf/0x130 [ 959.953517] __x64_sys_mount+0xba/0x150 [ 959.954333] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 not in group (block 0)! [ 959.957496] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 959.957517] do_syscall_64+0xf9/0x670 [ 959.957538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 959.957551] RIP: 0033:0x4608aa [ 959.957565] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 18:42:22 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_80211_inject_frame(&(0x7f00000001c0)=@device_b, &(0x7f0000000280)=@mgmt_frame=@assoc_resp={@with_ht={{{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x8}, @device_a, @device_b, @initial, {0x0, 0x80}}, @ver_80211n={0x0, 0x3, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1}}, 0xa001, 0x20, @random=0x4, @void, @void, [{0xdd, 0x38, "5d5f93b2f1e1a0d8b3a31edbb63ed682c572fdd0dcef69b50366f3ff014d6690b974ba89006b422a1aa9433901786be2457d412e4a6b2dc5"}, {0xdd, 0x1b, "48942bc5d0653edd3445ff671b5f83f26d822304ac367380ff39bf"}, {0xdd, 0x79, "1411708c7fb3e38226cd3f5caffe0903083ab3c0e7f9684f69b2409e2cae86a25b57ec35a9541ee1914f4ab96e2cdd826f2f383e2854ec9449e55635b254e48e576a2e84797575c3a281f6f0c98c775422e1c80ab918625dd0d8e304c01ecf19020ed7ed523c51f37e38b37cdca7d332b951d43168371ccb25"}, {0xdd, 0x81, "ff7a0ac52905a41279d80b22877ec21c27e8054ca6de32d5d3d7afccdb62ffb3e2d67c8c2a744ace87634b6623909c1498aded77a9f4f2e570be1c380a4d5b316b9cecd210a564bcded363803787bfb1a5ce68a498f15050f5f63cf0f3f2b33c6cc825d2cd253beafb1e861ea42992fa281ca19304b889ef19a77b4adef4240a19"}, {0xdd, 0x8e, "57af623ae39e2bd01eeaafa47ab8de97a6773a80d3b95b172a256db4db0dc87375b6957123bb2a780a1ada420e86821a39f43a0d7d2d1bf058ea914ba22d6585ad491ed2987af2f061644a4ed7a8c92ddb7a37cc0c64b5e4291a3a86771cf1f97ef418fdf3d2ee9c5470fe7fb93b5ddb40987b995d7c5158b86aa18421d37a030dc4160c61825744fddecadbdd44"}, {0xdd, 0x1c, "71f7bdcdf7d4b997f2fe302f92bd33c771192748a377767eb7768ca5"}, {0xdd, 0x2a, "3577e35438ab605cfeded8072b1404edbac417d375a75aade071b97b6b5d5c95f8f6046cc44ca56956cd"}]}, 0x251) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x2, 0x80000001, {0x77359400}, {0x1, 0x0, 0x2c, 0x0, 0x3, 0x3, "65d73718"}, 0x6, 0x3, @offset=0xa1, 0x6fd6, 0x0, r3}) [ 959.957573] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 959.957587] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 959.957595] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 959.957603] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 959.957612] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 959.957621] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:22 executing program 4 (fault-call:3 fault-nth:40): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:22 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f0000000140)={@my=0x0, 0x2}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x20000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(r3, 0x7ac, &(0x7f00000005c0)={&(0x7f0000000180)={{@hyper, 0x9}, {@host, 0x5}, 0x400, "730c025876ceee2c30b341981929c0618dc670fb922758c916650e82f20f5ea29bbbe6df286320579c6b8e902b57f37d6f2afccb0d4943cd8c8f93c43828808842bbd5f9137cb4bfdef7420f766755ed6efe52055923f67ac8ff9715e6d5779b8ee3295b1e5f57eeffe699b9a0d14ce004ed3116a2f7a56ab520fd1bf250062d7343666a7e33edb0a0c30c6e5698ce079d0e464cc6f12f79425519d358309be72e9feabc2c4de207448d82041954bdf05102abaed4cee39dd7a126c7bcd76daf575af86ed67df1c60b1add5aea039223171c9ad278e64d6e448150021acf55ec7cbe89af618fce0d9773de9fc0f6bb54e06bad4dae88e653b058d46ff81fa955c61b4a2ab087faebf0898676c72faa1f504a3b856627c2bb0049568b24bd17fb5ec06a8d4a72290ca52a364b6a2b78546bebb3dc8cc7124ec32c13059b83140c78e7b235bd6c976a119eb059949b58d4f3562bc8d263b4b058cad50cd85709615753eeaf56c777f826f5086f874c516d1e514fa2726540117e2d41b06f313a55e5bc235a9460cc7945583e36f0751ce96066cf7f393e7cdad839ed1ba05987395e20067902caa0f25e0ba78fbab5cb8dca57f99d21d6cd0ddbdcf4217c5586bdfa454b6e16ffcf213ae3f14aeba222b85cb37eabb2731eb502375a22e521d0ead56515a1243ffd62717a2b6832b1fe960b9e4a3a0c282955e5f9abbeb30fa9e17a8ba13fd7ce294e5e1be1b11aedef79a43a316cf1df1be9fed1db54431e70f3d8dfbf5daa17d4276275beac26ffb52030cbd2264f03e927aff9c616208abccf6fddeb734aec24b80c3879828c747b35a54cea94ecfabd48ecb20c6f991e4ecce0f5afa297c08fe5649a63ee3698b99627c74e80d7ae918e5e3577fb7ee6efed280531780692bddc7c0cbd6c0763aea980e28731a3d82e5908d81c775e71fe5ea5365fe3fceefd5ad11b486483f546f538b1255f9cf94468f2f5208d6532505971f4b218fd79c5cdf4759595f2c9358bab2b5cee65bc6a844238fee39af1cf95fbc21dfddfa024be780ea6b1bbb4296ef91bb2db9354b840b78a4e8399cd992c35f55a7687ef306ee367fdc41370fffae32639750eba6b01f085e39e88889d46d49da807e9e2a52603db2cc557d641880f72b23744f78518a8b377d87c7cec31deb97b33b61d11809b8e98860ddcde9c3a1c2b9afb3040d411e1a871a135c94150f0779a1ce6e6add27328d49e433d9e161c7b16c9597c902ebb2587ac4e941856925599f201bb37b99481e227f73a5bd9dce2be3f18e080088f1259f01c6f26913317459d3a433ff8b832b113b645f1b5d0fe3146b19f5625a62820bc8c579d4926617b2713f16a5efb64a7dab6a06eabc196257d3d8a43fa352505c62d1f1b47ce86f14e3235afdc806eef59b6da30fbcb41573b5b7afdf7662a470a43ed88"}, 0x418, 0x9}) 18:42:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x800000000000000, &(0x7f0000000040)) [ 960.076950] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 960.097018] EXT4-fs (loop3): group descriptors corrupted! 18:42:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010002c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 960.265865] FAULT_INJECTION: forcing a failure. [ 960.265865] name failslab, interval 1, probability 0, space 0, times 0 [ 960.294833] CPU: 1 PID: 4233 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 960.302650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.312007] Call Trace: [ 960.314606] dump_stack+0x22c/0x33e [ 960.318248] should_fail.cold+0xa/0x2f [ 960.322147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 960.327258] ? lock_acquire+0x170/0x3f0 [ 960.331232] __should_failslab+0x153/0x1b6 [ 960.335449] should_failslab+0x5/0xf [ 960.339160] kmem_cache_alloc+0x2b1/0x4a0 [ 960.343294] ? preempt_schedule_irq+0xdb/0x180 [ 960.347857] getname_flags+0xce/0x590 [ 960.351642] user_path_at_empty+0x2a/0x50 [ 960.355768] do_mount+0x14a/0x2f10 [ 960.359293] ? copy_mount_string+0x40/0x40 [ 960.363511] ? copy_mount_options+0x1d0/0x370 [ 960.367991] ? copy_mount_options+0x1df/0x370 [ 960.372466] ? copy_mount_options+0x261/0x370 [ 960.376941] ksys_mount+0xcf/0x130 [ 960.380462] __x64_sys_mount+0xba/0x150 [ 960.384419] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 960.388982] do_syscall_64+0xf9/0x670 [ 960.392766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 960.397990] RIP: 0033:0x4608aa 18:42:22 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000100)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) [ 960.401165] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 960.420050] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 960.427735] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 960.434993] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 960.442251] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 960.449508] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 960.456763] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:23 executing program 2: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffc, &(0x7f0000000200)='logon\x00', &(0x7f0000000240)='{,\x00') ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, &(0x7f0000000100)=0x4) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000140)={0x1, 0x0, {0xfffffff9, 0x80, 0x3f, 0xfffffff9}}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x10) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x80045505, &(0x7f00000001c0)=0x7fffffff) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x900000000000000, &(0x7f0000000040)) [ 960.568526] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! 18:42:23 executing program 4 (fault-call:3 fault-nth:41): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 960.619783] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 960.637975] EXT4-fs (loop3): group descriptors corrupted! 18:42:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010003f0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:23 executing program 2: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f0000000100)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r0, r1) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f0000000040)) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)="0428cbcf618226e7657395f2d69604f088955eb975227f6597a6392ab9a250a0d6f7e38ecaa4c974dd399cb83a19064fb8a22c6875d69ffdcfff29ca7c8c3d88f9f8cc60571580665aae3d4539b64b1840caad3d5038263ab35f30ade99c3a0d6cec7f3c89becd58364690f51222f181e06d7b424f24d9259c1cfa0ddf621edde3c56bc010403cbb174f29fb9fc611b6050ebac61096bb32a000a72b2f821181e157b57723a748ed2a9f7b778c4e565e770b60bc96b1a17e62516abed3266f24d3911a4bfcd7830c2589454b1f5ed3bfaa721f4335984788300ebe1cb3b529937dc4e4c873934d7e5f5c70c1ad5cc4f8c9") [ 960.833104] FAULT_INJECTION: forcing a failure. [ 960.833104] name failslab, interval 1, probability 0, space 0, times 0 [ 960.891546] CPU: 1 PID: 4282 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 960.899384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 960.908737] Call Trace: [ 960.911338] dump_stack+0x22c/0x33e [ 960.914979] should_fail.cold+0xa/0x2f [ 960.918877] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 960.924004] ? lock_acquire+0x170/0x3f0 [ 960.927993] __should_failslab+0x153/0x1b6 [ 960.932235] should_failslab+0x5/0xf [ 960.935957] kmem_cache_alloc+0x2b1/0x4a0 [ 960.940122] alloc_vfsmnt+0x23/0x780 [ 960.943941] vfs_kern_mount.part.0+0x27/0x470 [ 960.948451] do_mount+0x51c/0x2f10 [ 960.952005] ? check_preemption_disabled+0x41/0x2b0 [ 960.957031] ? copy_mount_string+0x40/0x40 [ 960.961281] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 960.966132] ? _copy_from_user+0xd2/0x130 [ 960.970283] ? copy_mount_options+0x261/0x370 [ 960.974776] ksys_mount+0xcf/0x130 [ 960.978316] __x64_sys_mount+0xba/0x150 [ 960.982294] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 960.986876] do_syscall_64+0xf9/0x670 [ 960.990681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 960.995863] RIP: 0033:0x4608aa [ 960.999052] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 961.017947] RSP: 002b:00007fa359834a88 EFLAGS: 00000216 ORIG_RAX: 00000000000000a5 [ 961.025654] RAX: ffffffffffffffda RBX: 00007fa359834b20 RCX: 00000000004608aa [ 961.032924] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359834ae0 [ 961.040189] RBP: 00007fa359834ae0 R08: 00007fa359834b20 R09: 0000000020000000 [ 961.047465] R10: 0000000000000000 R11: 0000000000000216 R12: 0000000020000000 [ 961.054730] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 965.321350] IPVS: stopping master sync thread 13502 ... [ 965.536270] IPVS: ftp: loaded support on port[0] = 21 [ 965.572217] device vlan1 left promiscuous mode [ 965.577275] bridge3: port 2(vlan1) entered disabled state [ 965.585706] device veth0_to_hsr left promiscuous mode [ 965.593019] bridge3: port 1(veth0_to_hsr) entered disabled state [ 965.602660] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 965.609371] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 965.617620] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 965.624834] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 965.633884] device bridge_slave_1 left promiscuous mode [ 965.639320] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.646707] device bridge_slave_0 left promiscuous mode [ 965.652417] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.662343] device veth1_macvtap left promiscuous mode [ 965.667622] device veth0_macvtap left promiscuous mode [ 965.673050] device veth1_vlan left promiscuous mode [ 965.678088] device veth0_vlan left promiscuous mode [ 967.560766] Bluetooth: hci0: command 0x0409 tx timeout [ 969.640759] Bluetooth: hci0: command 0x041b tx timeout [ 971.484291] bond8 (unregistering): Released all slaves [ 971.493249] bond7 (unregistering): Released all slaves [ 971.501385] bond6 (unregistering): Released all slaves [ 971.510262] bond5 (unregistering): Released all slaves [ 971.518628] bond4 (unregistering): Released all slaves [ 971.528568] bond3 (unregistering): Released all slaves [ 971.536797] bond2 (unregistering): Released all slaves [ 971.546343] bond1 (unregistering): Released all slaves [ 971.587007] device hsr_slave_1 left promiscuous mode [ 971.595203] device hsr_slave_0 left promiscuous mode [ 971.614496] team0 (unregistering): Port device team_slave_1 removed [ 971.625413] team0 (unregistering): Port device team_slave_0 removed [ 971.635759] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 971.646537] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 971.681879] bond0 (unregistering): Released all slaves [ 971.720833] Bluetooth: hci0: command 0x040f tx timeout [ 971.765267] chnl_net:caif_netlink_parms(): no params data found [ 971.847049] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.853660] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.865153] device bridge_slave_0 entered promiscuous mode [ 971.872604] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.878992] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.886602] device bridge_slave_1 entered promiscuous mode [ 971.906824] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 971.928417] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 971.959419] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 971.979004] team0: Port device team_slave_0 added [ 971.987437] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 972.002036] team0: Port device team_slave_1 added [ 972.029576] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 972.043598] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 972.075709] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 972.088779] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 972.101297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 972.134450] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 972.149826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 972.163771] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 972.199842] device hsr_slave_0 entered promiscuous mode [ 972.208997] device hsr_slave_1 entered promiscuous mode [ 972.219054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 972.229781] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 972.378012] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.384423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 972.391148] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.397502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 972.468147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 972.479470] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 972.497261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 972.508482] bridge0: port 1(bridge_slave_0) entered disabled state [ 972.518897] bridge0: port 2(bridge_slave_1) entered disabled state [ 972.545737] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 972.558051] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.570999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 972.578676] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.585050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 972.618230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 972.627581] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.634010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 972.669771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 972.678264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 972.692274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 972.699835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 972.715204] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 972.725425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 972.734018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 972.765166] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 972.778889] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 972.788916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 972.797174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 972.814749] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 972.838007] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 972.859515] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 972.868453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 972.883943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 972.953315] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 972.967247] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 972.975220] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 972.986191] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 972.993351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 973.001806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 973.009506] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 973.017046] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 973.026739] device veth0_vlan entered promiscuous mode [ 973.038438] device veth1_vlan entered promiscuous mode [ 973.044707] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 973.054719] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 973.070385] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 973.081190] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 973.088130] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 973.096729] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 973.104510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 973.117923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 973.127884] device veth0_macvtap entered promiscuous mode [ 973.134740] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 973.144492] device veth1_macvtap entered promiscuous mode [ 973.151805] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 973.160291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 973.170850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 973.179363] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 973.189937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.199333] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 973.209088] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.218631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 973.228622] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.237827] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 973.247616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.257076] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 973.267755] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.278014] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 973.285446] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 973.292346] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 973.299557] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 973.307107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 973.315055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 973.326383] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 973.336303] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.345456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 973.355194] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.364367] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 973.374125] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.383966] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 973.397022] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.406678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 973.419229] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 973.429480] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 973.436699] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 973.444124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 973.453120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 973.587200] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 973.595994] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 973.608660] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 973.630786] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 973.649800] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 973.656351] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 973.670100] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 973.678716] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 973.702744] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 973.801161] Bluetooth: hci0: command 0x0419 tx timeout 18:42:36 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = socket$rxrpc(0x21, 0x2, 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0x9a0000, 0x6, 0xffff, r1, 0x0, &(0x7f0000000140)={0x9b0970, 0x7ff, [], @string=&(0x7f0000000100)=0x3b}}) 18:42:36 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:36 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x3, 0x10001}}}, 0x93) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r2}}, 0xc) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xc00000000000000, &(0x7f0000000040)) 18:42:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000400c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:36 executing program 4 (fault-call:3 fault-nth:42): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 974.019591] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 974.083251] FAULT_INJECTION: forcing a failure. [ 974.083251] name failslab, interval 1, probability 0, space 0, times 0 [ 974.106480] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 974.125199] CPU: 1 PID: 4575 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 18:42:36 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000100)=0x10000) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x7f) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 974.133008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.142363] Call Trace: [ 974.144961] dump_stack+0x22c/0x33e [ 974.148603] should_fail.cold+0xa/0x2f [ 974.150486] EXT4-fs (loop3): group descriptors corrupted! [ 974.152519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 974.152536] ? lock_acquire+0x170/0x3f0 [ 974.152561] __should_failslab+0x153/0x1b6 [ 974.152578] should_failslab+0x5/0xf [ 974.152595] __kmalloc_track_caller+0x2d8/0x4e0 [ 974.152609] ? kstrdup_const+0x53/0x80 [ 974.152627] kstrdup+0x36/0x70 [ 974.152641] kstrdup_const+0x53/0x80 [ 974.152660] alloc_vfsmnt+0xb5/0x780 [ 974.194257] vfs_kern_mount.part.0+0x27/0x470 [ 974.198747] do_mount+0x51c/0x2f10 [ 974.202296] ? check_preemption_disabled+0x41/0x2b0 [ 974.207323] ? copy_mount_string+0x40/0x40 [ 974.211558] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 974.216379] ? _copy_from_user+0xd2/0x130 [ 974.220526] ? copy_mount_options+0x261/0x370 [ 974.225020] ksys_mount+0xcf/0x130 [ 974.228550] __x64_sys_mount+0xba/0x150 [ 974.232509] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 974.237073] do_syscall_64+0xf9/0x670 [ 974.240875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.246057] RIP: 0033:0x4608aa [ 974.249229] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 974.268113] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 974.275853] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa 18:42:36 executing program 0: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x1ff, 0x3, 0x4, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'trusted.', ':*!.\'\x00'}) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) setsockopt$inet6_buf(r1, 0x29, 0x2b, &(0x7f0000000140)="8c121ba6c579f0c29ab021d4027e80a39eacf8b47a209eb2f156e4f8b6c3af19665a36032d21cb3b3b6a472aa03621d46df70fd75cfe9feacfddd218a328411f904ada930193e9c33baf771b56cdb831597fdd3d4fec6972081aaf", 0x5b) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x2}, 0x0, 0x0, 0x2}) 18:42:36 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r3) ioctl$CHAR_RAW_ROTATIONAL(r1, 0x127e, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) read$FUSE(r2, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_getaffinity(r4, 0x8, &(0x7f0000000140)) [ 974.283115] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 974.290374] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 974.297625] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 974.304880] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:36 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r2, r4) syz_mount_image$ufs(&(0x7f0000000140)='ufs\x00', &(0x7f00000001c0)='./file0\x00', 0x1819, 0x7, &(0x7f0000000680)=[{&(0x7f0000000240)="0c3dddfb835a60c23dadd3c915e5dfe3de6ec869ac45dbd67d89eadd785c34fed824422ba8a4993a85e99673bda2db59565c0d02f972039f36f6c7a1cdd8e828eb01ca3f2e82ae305ab616f423dcf41ec63f0f89df7c4327bbc4d6d97572fd70938248d98da7afd509bb64af8486ec3e658ef6d11fad8a25835f3bbf7cf8b9af4eec0eb794fcac29b8dae512d791dc6a6778b10a530d70fcef4f7e89933975de22f16615e389e5fb470c729631fe6f59de5306c83a489ecf814fd1e99b90e6d21982f11df3438df9573fd0c0", 0xcc, 0xffffffff}, {&(0x7f0000000340)="5487ea91ad65cda747bbb930dc542ab944283284179f39fb3c642491c81ce2a888db914a3120714fc213af382fd17dcb0c8f3804b56fc2379ed0e8920143891c541c342b1ba8840a80093e0c66a8a95b2b47253095a16df749a3eb7770", 0x5d, 0x8}, {&(0x7f00000003c0)="96f29a87219c3675c35d6e112f469dcedc5e100f4ab468e4a0d81cceed161fcd58bbc86ac9db447ec679539b44b5165723eae57720252f9cde0675b588ae78aba1b43ffc798b11441dbd070c8cca7ef5d644c38fe09ece1c78f427f1d86e1103134d0c54f417ef6108714051db213efe839e4923aefb7f68ed9ba27fd6a3f1813477792ce1e2ee5f9972fbf0a22359ca44b58531472a5838314db1288e091247c1da71c8b93606bed1f4a97b9845f216f9996fa1845690084b76d12cdbe079a3dec6495f5e0f0be7db41e763da3d8fd0c6263b838a13ed3cf8becdace209582a21b2906e4bf3bbf0f1667bc2d9", 0xed}, {&(0x7f00000004c0)="d497a4f0d4c5dea76a854a5181c1f22cb4651b0a46ef7b71957987cf135666001029b52f57cdb2ed2fe879aa6f0295a94917c1a6c29b5b772fb053cda021d1ae4aadbab3472f2699761b329f41006342ac1ffd53df09af194ec33361421472e2d8d2e16e5120b77a102b01", 0x6b, 0x4}, {&(0x7f0000000540)="8ad0e6b823a99f09c9", 0x9, 0x3}, {&(0x7f0000000580)="de2e709251bc9402dc03d45c14bc211e8f02", 0x12, 0x6}, {&(0x7f00000005c0)="ade5e4fcff1920477c556a92a87ac7a7b90603327deaf6784447e8e1add5b7c2ed2cd3b103a5249d7f6fdc48b6ec94344295822ca9166278816f60595b12d627861575f848ceb8ee5eeda37b2f02aabfdfa1b0c2cc695c2d6f2d16b11139db6197fbe19618b22d9116de00c4d049c3cfcde83ce70e268ec78044ff7f22cf9d0961f0babd2e90d9f7e3262898034c26c4b9f085a62913c062e500d599bf7c68ed2e193139337a31a9c2e94bb8b0", 0xad, 0x87ed}], 0x1080040, &(0x7f0000000740)={[{','}], [{@smackfshat={'smackfshat'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise='appraise'}, {@euid_lt={'euid<', 0xee01}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@obj_role={'obj_role', 0x3d, '\xe0/\\-@!-&,$}&/\xf8'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '.\\.]+\\-{}'}}, {@fowner_lt={'fowner<'}}]}) pipe(&(0x7f0000000180)) socket$inet_tcp(0x2, 0x1, 0x0) dup2(r3, 0xffffffffffffffff) ioctl$IOCTL_VMCI_QUEUEPAIR_DETACH(0xffffffffffffffff, 0x7aa, &(0x7f0000000100)={{@any, 0x80000001}, 0x5, 0x100}) 18:42:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1000000000000000, &(0x7f0000000040)) 18:42:36 executing program 4 (fault-call:3 fault-nth:43): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:36 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:37 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x1}) 18:42:37 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x400, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r1, 0x7ab, &(0x7f0000000700)={&(0x7f00000002c0)={{@local}, {@hyper, 0x4}, 0x400, "ed3c020dc3c5e48070be7336ae824fbe80b48d1f658c0d0bee4af4a5b2b1c48079734906358879d38b5b60eac69cc11a929f5e5e3e2e1e7263181aa1ae6eff69e738eacd29722a4386ef63ce114056b8d9dbd6d1914898fec738713e28609103192eb033f163c6240effdeb1049b14652749e0f9f383431e07f458b19b8c3891d9871cce6ab688f7bc41e09f0ee3201425c68cfb1145704df16041073c8029c6a80de5a92071a351cf7f671c9f48dc8f5a11b276ddf63370ea37d36355856c168fcb9077545c350be38ec30340401f60c1d88a40d944950ef87f7e8b16614757fe4f54d27cccb8b0ccb473509bb18ec93672df6d5e2aac6d60a008c021e26c598a6c839a83aa5e94061455d11eee1a4af0694370e597e614dcffdac1f7595dca1a2927c1008219a614eb1e3f995c68510fc140843a3b00cb0aa4686d21cdc03bff0f5991df951f8cb2a39321aa91ac90ff62cb7ddb34300829b763efea533facd5d761b7847bc6ff805f2e29b22c873f4f65bcc008508d79e01334d80354235dc1a754105e6a9fbbf7df9aa468b34ff2245fe0b31cf164cb98b4eecf56862c5a4d77981c64c16f6af8054af81b390c356e2e538b1e085d7dcf14e4334184d1a1b17c3477900ff35cc77a8eb017f44c0d41d7ca0776ae8e8c5f964658368f71103bb67b0358ede6e5187b13c7af152a57511c8e1c15f0cb8222d66692324ff8e456f5cc83a35fceb980d7eefdbf94147e89536a854bde65503b329633183692beffd5c6561b274839b935f73a8f0cbdec043832b18a94daef31aed86e329de9ad09fae543086d4e29a370d10db2fe75a887aab4c300981a8c7f74f1c6c5e1e59acd016f8f42bfb4a0c69cee12713912c06162f7c6449287b4497504e1db76ad01b3996bf248812319d540fdfa75c46eb5fd1f05923f7ddd02d412804913681c362a0f2c0a254635ebbbfc82ff10ac3e053523492965fcc036a269437258ad3c25631e6144eee42d6b7daec6e8cf55eaf8eb927527fbd32dfa51202c2a3d508625955ea535beffa64ace3f36553c57a397d6c7b28c48c93ad74559835047d8dcd36436c6ae8db9429a018af206db0fdf53f5086ca97ad7cfb8f1543a44822baba44a19cbbee180e948dfff36d673389754968a159f9bb13641b938c00e9bd764bb3c580bae7e4344a6a3a4ff731fc167201fe868446eb4dbafcaac31f3ef1e58ff140a44376e5e2d20a1d5460fb5df2bd6041072542729d491a0a15ee66bce042de98924f8485e389b9f68b49e3d43c8bcc2f31da62d494d2dbd3ead1ec836006ec556b1e5285f098fa568332bdac0f91b98f68d083e554e5fa31feb6d52505914dd97dbcea52bfb4195d193f59fe0ec8b8a20df69947b5e0d7eb187c93cf2b3aba03fa2d4919a8f24daebc595dd8c42aa857511c12623ca3efebc0e8cdc69b1f1"}, 0x418, 0x1ef}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@my=0x0}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x64, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x20, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, [], 0x1b}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000000) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1ff, 0x20001) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x5}) [ 974.642249] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 not in group (block 0)! [ 974.655891] FAULT_INJECTION: forcing a failure. [ 974.655891] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 974.676874] EXT4-fs (loop3): group descriptors corrupted! 18:42:37 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x80000001, 0x1810c0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) syz_mount_image$fuse(&(0x7f0000000380)='fuse\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfd}}], [{@dont_measure='dont_measure'}, {@uid_gt={'uid>', r5}}, {@subj_user={'subj_user', 0x3d, '[\\]'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@hash='hash'}, {@dont_hash='dont_hash'}]}}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) clone(0x200, &(0x7f0000000100)="1bb8ede2b964284013f89bc024d8b84d22cb93a72ccf563518c98937b7b99b4941f9d537d7c905d7149d1bdfe9e6483bd0b589f6ddd78ec53e9917fd9b067830d396926de703eb9c0706f855d36eceba960d86b84cc27fa394159ad7c3cc61b3a7dd53923fd4e845b47335728131e0f921ed117cf792e9b92536f4b1dd3e0bca9ea6833936632e2794fe06b3cad870129a1333a0100ac52967ba8cdd01cd38ef4564a392c86e8ed6554a5bd444efa4cb49e0a591f31d2e4651e54a9746b451413cc818b52b181b2faf68244d03a72ac597bc64ec29de00114897", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="b05859d69286e5f0e5b36367ecba4ad5360f2a7f76dcfc89a9b76b9228ba36bb75ec92820e739f4798602903ae15607294cdc80cedd1ab708ab22d30544b4adc0ebf34e765a7420676e90c5cb99f48506e1d862dfbe18357dde7e120e1eb8233ea228a57b54488ecbe1daafe4e34a2aaaaa068e369dfda98ebf49f18c17011c5a4fef61e2686a426e6849019795ba107ec93d6dfb3d8aabfea2af81d78273b08e29c86b769a8686b54a0b26c2d8c59e37c29789b95affb1790527475258ad9f4e85c13406114da90c086015f98fddf6919429b59e4164b6ada775a2ab13755ffa2c04b3a4805aa9a73800f0f9b") ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 974.701865] CPU: 1 PID: 4626 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 974.709681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.719025] Call Trace: [ 974.721623] dump_stack+0x22c/0x33e [ 974.725265] should_fail.cold+0xa/0x2f [ 974.729166] ? lock_acquire+0x170/0x3f0 [ 974.733152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 974.738278] __alloc_pages_nodemask+0x256/0x2a60 [ 974.743039] ? lock_acquire+0x170/0x3f0 [ 974.747026] ? check_preemption_disabled+0x41/0x2b0 18:42:37 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x118) [ 974.752191] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 974.757215] ? pcpu_alloc+0x8de/0x1220 [ 974.761124] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 974.765974] ? pcpu_alloc+0xee6/0x1220 [ 974.769876] ? lock_downgrade+0x750/0x750 [ 974.774036] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 974.778900] alloc_pages_current+0x19d/0x2c0 [ 974.783318] get_zeroed_page+0x10/0x40 [ 974.787209] selinux_sb_copy_data+0x28/0x4e0 [ 974.791622] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 974.796644] ? pcpu_alloc+0xc9/0x1220 [ 974.800461] security_sb_copy_data+0x48/0xa0 [ 974.804879] mount_fs+0x22a/0x318 [ 974.808346] vfs_kern_mount.part.0+0x68/0x470 [ 974.812858] do_mount+0x51c/0x2f10 [ 974.816410] ? copy_mount_string+0x40/0x40 [ 974.820656] ? copy_mount_options+0x1ef/0x370 [ 974.825169] ? write_comp_data+0xf/0x70 [ 974.829148] ? copy_mount_options+0x261/0x370 [ 974.833648] ksys_mount+0xcf/0x130 [ 974.837280] __x64_sys_mount+0xba/0x150 [ 974.841262] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 974.845910] do_syscall_64+0xf9/0x670 [ 974.849833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.855004] RIP: 0033:0x4608aa [ 974.858177] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 974.877057] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 974.884746] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 974.892009] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 974.899282] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 974.906618] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 974.913867] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:37 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x2}, 0x1}) 18:42:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:37 executing program 4 (fault-call:3 fault-nth:44): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:37 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x10000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1100000000000000, &(0x7f0000000040)) 18:42:37 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000140)={'gre0\x00', 0x0, 0x8, 0x1, 0x5, 0x8000, {{0xa, 0x4, 0x2, 0x1b, 0x28, 0x66, 0x0, 0x5, 0x29, 0x0, @multicast1, @private=0xa010100, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0xa2, 0x0, 0x6, [0x4000002, 0xb612, 0x6]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getqdisc={0x2c, 0x26, 0x100, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0xf, 0xfff1}, {0x4, 0xfff7}, {0x0, 0xc}}, [{0x4}, {0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 18:42:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:37 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vmci\x00', 0x2, 0x0) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 975.130756] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 975.153224] FAULT_INJECTION: forcing a failure. [ 975.153224] name failslab, interval 1, probability 0, space 0, times 0 18:42:37 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x1}) [ 975.193218] CPU: 1 PID: 4673 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 975.201043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.210399] Call Trace: [ 975.213005] dump_stack+0x22c/0x33e [ 975.216652] should_fail.cold+0xa/0x2f [ 975.220568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 975.225686] ? lock_acquire+0x170/0x3f0 [ 975.229682] __should_failslab+0x153/0x1b6 [ 975.233927] should_failslab+0x5/0xf [ 975.237657] kmem_cache_alloc+0x2b1/0x4a0 [ 975.241820] ? debug_check_no_obj_freed+0x201/0x482 [ 975.246835] getname_kernel+0x4f/0x370 [ 975.250727] kern_path+0x1b/0x40 [ 975.254088] lookup_bdev+0xfc/0x220 [ 975.257696] ? bd_acquire+0x440/0x440 [ 975.261493] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 975.266147] blkdev_get_by_path+0x1b/0xd0 [ 975.270291] mount_bdev+0x5b/0x3b0 [ 975.273815] ? parse_options+0xf50/0xf50 [ 975.277861] mount_fs+0xa3/0x318 [ 975.281228] vfs_kern_mount.part.0+0x68/0x470 [ 975.285786] do_mount+0x51c/0x2f10 [ 975.289316] ? check_preemption_disabled+0x41/0x2b0 [ 975.294371] ? copy_mount_string+0x40/0x40 [ 975.298592] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 975.303419] ? _copy_from_user+0xd2/0x130 [ 975.307548] ? copy_mount_options+0x261/0x370 [ 975.312040] ksys_mount+0xcf/0x130 [ 975.315572] __x64_sys_mount+0xba/0x150 [ 975.319530] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 975.324098] do_syscall_64+0xf9/0x670 [ 975.327884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.333064] RIP: 0033:0x4608aa [ 975.336246] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 975.355168] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 975.362866] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 975.370165] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 975.377416] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 975.384673] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:42:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 975.391944] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1200000000000000, &(0x7f0000000040)) 18:42:37 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) io_setup(0x2, &(0x7f0000000180)=0x0) io_pgetevents(r1, 0x0, 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={[0x8001]}, 0x8}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) splice(r0, &(0x7f0000000100)=0x4, r0, &(0x7f0000000140)=0x2, 0x100000001, 0x2) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0x80000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f00000002c0)={{@local, 0x7}, 0x0, 0x0, 0x4000000}) 18:42:37 executing program 4 (fault-call:3 fault-nth:45): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:38 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, &(0x7f0000000100)={{0x2, @name="cfe66886b75fa941a2bef4ce4b2149e04113badc87157b95c40a7c1f9abd9ed6"}, "dca73f1d4748009992ec9e7903dae1e4c7f26f101240a26b9bc78296e6e472f5", 0x3}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}}) 18:42:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 975.531536] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x1f00000000000000, &(0x7f0000000040)) 18:42:38 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$VFIO_IOMMU_MAP_DMA(r1, 0x3b71, &(0x7f0000000100)={0x20, 0x1, 0x10001, 0x9, 0x5}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:38 executing program 0: ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x2) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:38 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000100)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000240)) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r3) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000140)) socket$kcm(0x29, 0x1, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 975.684301] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 975.692473] FAULT_INJECTION: forcing a failure. [ 975.692473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 975.706712] CPU: 1 PID: 4719 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 975.714528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.723878] Call Trace: [ 975.726455] dump_stack+0x22c/0x33e [ 975.730095] should_fail.cold+0xa/0x2f [ 975.733996] ? lock_acquire+0x170/0x3f0 [ 975.737984] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 975.743103] __alloc_pages_nodemask+0x256/0x2a60 [ 975.747852] ? lock_acquire+0x170/0x3f0 [ 975.751828] ? check_preemption_disabled+0x41/0x2b0 [ 975.756845] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 975.761866] ? pcpu_alloc+0x8de/0x1220 [ 975.765796] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 975.770630] ? pcpu_alloc+0xee6/0x1220 [ 975.774566] ? lock_downgrade+0x750/0x750 [ 975.778699] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 975.783534] alloc_pages_current+0x19d/0x2c0 [ 975.787945] get_zeroed_page+0x10/0x40 [ 975.791828] selinux_sb_copy_data+0x28/0x4e0 [ 975.796232] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 975.801245] ? pcpu_alloc+0xc9/0x1220 [ 975.805064] security_sb_copy_data+0x48/0xa0 [ 975.809499] mount_fs+0x22a/0x318 [ 975.812954] vfs_kern_mount.part.0+0x68/0x470 [ 975.817449] do_mount+0x51c/0x2f10 [ 975.820984] ? do_raw_spin_unlock+0x171/0x240 [ 975.825471] ? check_preemption_disabled+0x41/0x2b0 [ 975.830469] ? copy_mount_string+0x40/0x40 [ 975.834707] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 975.839545] ? copy_mount_options+0x261/0x370 [ 975.844025] ksys_mount+0xcf/0x130 [ 975.847547] __x64_sys_mount+0xba/0x150 [ 975.851525] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 975.856108] do_syscall_64+0xf9/0x670 [ 975.859893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.865064] RIP: 0033:0x4608aa [ 975.868499] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 975.887449] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 975.895142] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 975.902402] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 975.909665] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 975.916916] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 975.924165] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:38 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x51, 0x8, 0x2, {0x5, 0x4}, {0x0, 0xfff9}, @cond=[{0x2, 0xff, 0x4, 0x9, 0x7}, {0x6, 0x0, 0xde37, 0x1, 0x8, 0xc3}]}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:38 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) semctl$SETALL(0x0, 0x0, 0x11, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000240)=0x10000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) accept4$alg(r1, 0x0, 0x0, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$DRM_IOCTL_MODE_GETENCODER(r2, 0xc01464a6, &(0x7f00000001c0)={0x101}) dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x30000008}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000100)={{0x2, 0x4e23, @rand_addr=0x64010101}, {0x306, @link_local}, 0x4, {0x2, 0x4e22, @rand_addr=0x64010101}, 'vlan1\x00'}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x80000001) 18:42:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:38 executing program 4 (fault-call:3 fault-nth:46): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2000000000000000, &(0x7f0000000040)) 18:42:38 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:38 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x6, 0x331000) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000180)=[{{r1, r2/1000+60000}, 0x2, 0x1, 0x10000}, {{0x77359400}, 0x3, 0xfe00, 0x1}], 0x30) r3 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r3, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r3, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r3, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f00000001c0)={0x9, 0x5, 0x5}) socket$can_raw(0x1d, 0x3, 0x1) [ 976.181130] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:38 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{}, {}]}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@hyper}) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000240)={0x0, "908394459e7581fd11fd6d35a70f8e14"}) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000001280)=""/110) socket$tipc(0x1e, 0x2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f0000001240)={0x0, 0x0, [0x6, 0x101, 0x123, 0x400, 0x2, 0x5]}) setresuid(0x0, r3, 0x0) ioctl$SIOCAX25DELUID(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0x3, @bcast, r3}) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501600, 0x50) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0xfffffffffffffffb) syz_mount_image$minix(&(0x7f0000001300)='minix\x00', &(0x7f0000001340)='./file0\x00', 0x3a15, 0x9, &(0x7f0000001a00)=[{&(0x7f0000001380)="bdc3144f38bac3cac05a5b6936892f776515432a8687bea6cfa0ee5f2cc3d2bf119e7c9879650cb9c684d7df825dccb106df3bc2fe09aec5177d6015fbef2976522dd8856a0cd2264406f6c51b94b3585dd6bbad0f34879f4548e2300a00ad6dd437471b3e258e3b23fed5c4fa55f19b63ecfe6ad07ecbf8158e0fbbd9c879f7229adb284b5c98b49298ca258b763e00b00f5fa81920ec0a95ead295684e59638033287cb8a82c1fe9be1ef895f6cfbca9a46325f919c28fe90f00ab9105b07140f37dde7825", 0xc6, 0x948}, {&(0x7f0000001480)="9d75819f99d08085798135640258d641a1e43a558d0d49893a4de7cf126f3528a50da4a95602e5d7b41ba4711185fa9dbafab391ac3758fa8bea524e0a887896f062a32453be4d1feb9c2fc74ba39f40f65ff58d9e2f419a0afb0ea006bb80a9a8c6bdac63c313348d88c43df80ba4b6b8770359fc7b781905b35f89ab3c1a54a5a27ea2863f55a180780ed1403e33308d4415b23dc52b057930d3e43bfff552d006b168e4892447b7f7d2fdac4264c43b7d533e081ff1ae938f87fcc1703bf587233995f19c1d485b4983f864fed923b71e84", 0xd3, 0x6}, {&(0x7f0000001580)="61380a8110d91ebb36702800222ac0808b8983369611e11177c5a1c2e886b6d7d5113a027c1111fa8c5384be9a3c174853462f62aa5844f9e9971d8bdeb968dc6a81f485ec1be0166638668b7b7e314adbfb3f25a4275eb44aa9b6a8a9914d4d2ba1df80fc0b943d5a7347274867e4c96fbbcd3d44ecb50ef20168ae12486f275b66cabdc056f99d35b2383a069e7cbc46218d294969806d362bf465c254", 0x9e, 0x40}, {&(0x7f0000001640), 0x0, 0x3ff}, {&(0x7f0000001680)="dbb7348d02d818baf1b65d490a15fbdbe2445b70b69945d16f9b3afb6bfaa5678fffa80ebe06f04d9e2acdf042eacb8ed7555a79f36aa376405247b6e4082cf3a582ebebe78d225fa8a3a2c4c2614e520e9e8d175736fa", 0x57, 0x9}, {&(0x7f0000001700)="edcfcf6b39b7eee41165d67595b73c4529954485de75d2fafee07b47436cbafd15c593afd9b3f99eaced22d7b01c732dd4e26edebd6e625a67a4a103b8099673a43a72d2d04ee96c4f09921ee092aa643d4f4271f20fe24ecbc1d944c3793792a04ef8bca790f13dfe111cd398e198f89cdb8f90c72211e26137ad8cd2e8338ccaa58c5dbea0ff613b34f2c2bf81c340eb648b5890c252ee7625168d2dda3c7670d133", 0xa3, 0x5}, {&(0x7f00000017c0)="9cae0e6675e5a108a5e540ad24f33abbde4575aa69f5b22ba32ee8fbb0adf93b5f0dcb7b9575f6b30896bb28b767cdadf902eee124cf7290cbcf60ff2fabe2a7d03ccdbfd0eabc8c7d50be053f8d30a0022ee3f86643da5d244eddc048e57b10250858088610d3c1b30b6b2e09bfeac2cdbafebafef33dfb92f1c842390e77521e8466351b4d8c9cc1542015a880c1e5831473cd65ce7657dad2dd96921a79eb4d9afb16ae831206737c53e02807288679bb1f02bd6ae4c8d9c6a88821c35f43877b06abffed6a", 0xc7, 0x4}, {&(0x7f00000018c0)="388a65", 0x3}, {&(0x7f0000001900)="22bff3727a55db4bcfca18b1a29c68342681e2abbcdf77a16d594d3a00f58bc75fcb7e35eab0a3c0cfcd35d76c8ac49b731208fcd14310983be3d656cd59af11c373238499da012dbd47f387f3d91d0d916deba851aa4b2eed9748d11a12323cd595bf049138d504d9ee68b0355192e90a96e1784343b6e37edeb7277686419743b1dec1dd574722575f78ed0d621ebca27fbf935a8eb7eaac6003c4022c7763c15c192935f90c89ed9bab41a4ca821451ed6abbaddd85b8a4663b4b3e4741321ead3f07a3cae06a8925d8362fb42185f668ea35cd8d8d447e2a1b92ba9c52e172ad3442c4396dfffb0f725b48e600", 0xef, 0x4}], 0x14000, &(0x7f0000001b00)={[{'/[*\\\\\xce'}, {'/dev/vmci\x00'}, {'{\x00'}], [{@fowner_lt={'fowner<', r3}}, {@uid_lt={'uid<', 0xee00}}, {@euid_gt={'euid>', r3}}, {@dont_hash='dont_hash'}, {@smackfsroot={'smackfsroot', 0x3d, '*@'}}]}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 976.272421] FAULT_INJECTION: forcing a failure. [ 976.272421] name failslab, interval 1, probability 0, space 0, times 0 [ 976.293588] CPU: 0 PID: 4780 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 976.301406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.310758] Call Trace: [ 976.313357] dump_stack+0x22c/0x33e [ 976.317000] should_fail.cold+0xa/0x2f 18:42:38 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000080)={{@local}, 0x1}) 18:42:38 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000200)=[0x1f], 0x1, 0x800, 0x0, 0xffffffffffffffff}) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper, 0xfffffffe}}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000280)={0x5, [0xfff7, 0x6, 0x3, 0x7, 0x6]}, &(0x7f00000002c0)=0xe) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000180)={0xe11, 0x3, 0x4, 0x1, 0xb660, {0x0, 0x2710}, {0x0, 0x2, 0x8, 0x32, 0x8, 0x4, "e2996c1d"}, 0xfffffffc, 0x4, @planes=&(0x7f0000000100)={0x0, 0x9, @userptr=0x80000001, 0x1}, 0x6, 0x0, r2}) [ 976.320899] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 976.326015] __should_failslab+0x153/0x1b6 [ 976.330260] should_failslab+0x5/0xf [ 976.333985] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 976.338662] ? set_bdev_super+0x110/0x110 [ 976.342823] sget_userns+0x121/0xd80 [ 976.346544] ? set_bdev_super+0x110/0x110 [ 976.350705] ? security_capable+0x8f/0xc0 [ 976.354862] ? ns_test_super+0x50/0x50 [ 976.358759] ? ns_test_super+0x50/0x50 [ 976.362645] ? set_bdev_super+0x110/0x110 [ 976.366777] ? ns_test_super+0x50/0x50 [ 976.370762] sget+0x137/0x170 [ 976.373854] mount_bdev+0xf8/0x3b0 [ 976.377376] ? parse_options+0xf50/0xf50 [ 976.381419] mount_fs+0xa3/0x318 [ 976.384771] vfs_kern_mount.part.0+0x68/0x470 [ 976.389251] do_mount+0x51c/0x2f10 [ 976.392780] ? check_preemption_disabled+0x41/0x2b0 [ 976.397893] ? copy_mount_string+0x40/0x40 [ 976.402112] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 976.406936] ? _copy_from_user+0xd2/0x130 [ 976.411107] ? copy_mount_options+0x261/0x370 [ 976.415584] ksys_mount+0xcf/0x130 [ 976.419111] __x64_sys_mount+0xba/0x150 [ 976.423067] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 976.427630] do_syscall_64+0xf9/0x670 [ 976.431412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.436607] RIP: 0033:0x4608aa [ 976.439793] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 976.458675] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 976.466365] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa 18:42:39 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x3, 0x2, 0x2, 0x1, 0x7, 0xf9, 0x6, {0x0, @in6={{0xa, 0x4e23, 0x4, @private0={0xfc, 0x0, [], 0x77}, 0x9}}, 0x40, 0xffffffff, 0xcdc3, 0x80, 0x5}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e22, 0x6d6, @rand_addr=' \x01\x00', 0x6}}}, &(0x7f0000000300)=0x84) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)) getrlimit(0xf, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 976.473660] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 976.480909] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 976.488160] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 976.495412] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:39 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f00000000c0)=0x90000) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) connect$inet(r3, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) dup2(r1, r3) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f0000000140)=0x8001) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000340)={[0x20]}, 0x8, 0x180000) msgget$private(0x0, 0x200) ioctl$IOCTL_VMCI_INIT_CONTEXT(r4, 0x7a0, &(0x7f0000000100)={@local}) r5 = creat(&(0x7f0000000240)='./file0\x00', 0x20) write$P9_RMKDIR(r5, &(0x7f0000000280)={0x14, 0x49, 0x1fe, {0x20, 0x3, 0x6}}, 0x14) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r5, 0x7a6, &(0x7f0000000000)={{@local, 0x40000000}, 0x0, 0x1}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RLOPEN(r2, &(0x7f0000000300)={0xfffffffffffffe3c, 0xd, 0x1, {{0x4, 0x2, 0x2}, 0x9fa1}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f00000001c0)={0x4, 0xc4, 0x5}) 18:42:39 executing program 4 (fault-call:3 fault-nth:47): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:39 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2200000000000000, &(0x7f0000000040)) [ 976.658426] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 976.690560] FAULT_INJECTION: forcing a failure. [ 976.690560] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 976.702525] CPU: 1 PID: 4828 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 976.710323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.719681] Call Trace: [ 976.722279] dump_stack+0x22c/0x33e [ 976.725943] should_fail.cold+0xa/0x2f [ 976.729843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 976.734985] ? preempt_count_add+0xaf/0x190 [ 976.739297] __alloc_pages_nodemask+0x256/0x2a60 [ 976.744076] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 976.748934] ? check_preemption_disabled+0x41/0x2b0 [ 976.753968] ? mark_held_locks+0xf0/0xf0 18:42:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 976.758039] ? rcu_read_lock_sched_held+0x174/0x1e0 [ 976.763068] ? __alloc_pages_nodemask+0x1c02/0x2a60 [ 976.768094] ? lock_acquire+0x170/0x3f0 [ 976.772085] ? check_preemption_disabled+0x41/0x2b0 [ 976.777135] cache_grow_begin+0xa1/0x9b0 [ 976.781214] cache_alloc_refill+0x2aa/0x410 [ 976.785543] kmem_cache_alloc+0x3b4/0x4a0 [ 976.789687] ? debug_check_no_obj_freed+0x201/0x482 [ 976.794707] getname_kernel+0x4f/0x370 [ 976.798595] kern_path+0x1b/0x40 [ 976.801971] lookup_bdev+0xfc/0x220 [ 976.805605] ? bd_acquire+0x440/0x440 [ 976.809386] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 976.813972] blkdev_get_by_path+0x1b/0xd0 [ 976.818107] mount_bdev+0x5b/0x3b0 [ 976.821642] ? parse_options+0xf50/0xf50 [ 976.825701] mount_fs+0xa3/0x318 [ 976.829166] vfs_kern_mount.part.0+0x68/0x470 [ 976.833648] do_mount+0x51c/0x2f10 [ 976.837171] ? do_raw_spin_unlock+0x171/0x240 [ 976.841665] ? check_preemption_disabled+0x41/0x2b0 [ 976.846678] ? copy_mount_string+0x40/0x40 [ 976.850915] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 976.855749] ? copy_mount_options+0x261/0x370 [ 976.860227] ksys_mount+0xcf/0x130 [ 976.863750] __x64_sys_mount+0xba/0x150 [ 976.867740] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 976.872319] do_syscall_64+0xf9/0x670 [ 976.876107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.881285] RIP: 0033:0x4608aa [ 976.884482] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 18:42:39 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@my=0x0}) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 976.903374] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 976.911085] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 976.918346] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 976.925599] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 976.932848] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 976.940221] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:39 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') 18:42:39 executing program 4 (fault-call:3 fault-nth:48): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:39 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f0000000200)=0x4001, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000240)={0x5, 0x8, 0x1, 0x4, 0x1, [0x6, 0x0, 0x5, 0x101]}) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x9, 0x777, 0x4}, &(0x7f00000001c0)=0x10) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) syz_mount_image$erofs(&(0x7f0000000280)='erofs\x00', &(0x7f00000002c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000400)=[{&(0x7f0000000300)="c72777d5650f4d5f41996d5113cf919cc7b755555651a049e1475700de2e2ff6e917941ed5d6f486ecce1c658553983ea8c3aa3deeb6b3", 0x37, 0xda}, {&(0x7f0000000340)="a72c17faeff977c78d51731262c5ff9e98a78e5105a7c7c68627bd0a541df69d30b09bb51c04a6df345426c2e434c21d99bce1b1d925905480aee2247dd63b67a7230e340625a0a1e895a01b5354972a29beab2811b083c573cf9055d718e5516a76a661d46ca319d3cc30304a935b0aa301c1b9cdde16d81dd7975385a3613d254bf45df285e016c624f2719c89303544c2d9b170c1c1b0", 0x98, 0x1000}], 0x8010, &(0x7f0000000440)={[{@user_xattr='user_xattr'}, {@acl='acl'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}, {@noacl='noacl'}]}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000100)={0x4, 0x1f3}) 18:42:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2300000000000000, &(0x7f0000000040)) [ 977.116319] FAULT_INJECTION: forcing a failure. [ 977.116319] name failslab, interval 1, probability 0, space 0, times 0 [ 977.133775] CPU: 1 PID: 4858 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 977.141589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.150943] Call Trace: [ 977.153551] dump_stack+0x22c/0x33e [ 977.157197] should_fail.cold+0xa/0x2f [ 977.161102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.166230] __should_failslab+0x153/0x1b6 [ 977.170482] should_failslab+0x5/0xf [ 977.174203] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 977.178628] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 977.178876] ? lock_acquire+0x170/0x3f0 [ 977.188626] ? sget_userns+0x209/0xd80 [ 977.192530] selinux_sb_alloc_security+0x41/0x210 [ 977.197382] security_sb_alloc+0x40/0x90 [ 977.201455] ? set_bdev_super+0x110/0x110 [ 977.205608] sget_userns+0x211/0xd80 [ 977.209328] ? set_bdev_super+0x110/0x110 [ 977.213486] ? security_capable+0x8f/0xc0 [ 977.217642] ? ns_test_super+0x50/0x50 [ 977.221542] ? ns_test_super+0x50/0x50 [ 977.225438] ? set_bdev_super+0x110/0x110 [ 977.229591] ? ns_test_super+0x50/0x50 [ 977.233487] sget+0x137/0x170 [ 977.236606] mount_bdev+0xf8/0x3b0 [ 977.240159] ? parse_options+0xf50/0xf50 [ 977.244219] mount_fs+0xa3/0x318 [ 977.247573] vfs_kern_mount.part.0+0x68/0x470 [ 977.252055] do_mount+0x51c/0x2f10 [ 977.255580] ? check_preemption_disabled+0x41/0x2b0 [ 977.260577] ? copy_mount_string+0x40/0x40 [ 977.264808] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 977.269632] ? _copy_from_user+0xd2/0x130 [ 977.273775] ? copy_mount_options+0x261/0x370 [ 977.278275] ksys_mount+0xcf/0x130 [ 977.281809] __x64_sys_mount+0xba/0x150 [ 977.285764] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 977.290340] do_syscall_64+0xf9/0x670 [ 977.294139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.299311] RIP: 0033:0x4608aa [ 977.302484] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 977.321368] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 977.329059] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 977.336315] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 977.343578] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 977.350828] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 977.358087] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:39 executing program 4 (fault-call:3 fault-nth:49): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:39 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f00000001c0)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x6) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100fff0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:40 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 977.526473] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 977.617500] FAULT_INJECTION: forcing a failure. [ 977.617500] name failslab, interval 1, probability 0, space 0, times 0 [ 977.651960] CPU: 0 PID: 4895 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 977.659777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.669137] Call Trace: [ 977.671714] dump_stack+0x22c/0x33e [ 977.675326] should_fail.cold+0xa/0x2f [ 977.679203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.684294] __should_failslab+0x153/0x1b6 [ 977.688510] should_failslab+0x5/0xf [ 977.692206] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 977.696854] ? lock_acquire+0x170/0x3f0 [ 977.700974] ? sget_userns+0x209/0xd80 [ 977.704852] selinux_sb_alloc_security+0x41/0x210 [ 977.709716] security_sb_alloc+0x40/0x90 [ 977.713771] ? set_bdev_super+0x110/0x110 [ 977.717914] sget_userns+0x211/0xd80 [ 977.721661] ? set_bdev_super+0x110/0x110 [ 977.725791] ? security_capable+0x8f/0xc0 [ 977.729933] ? ns_test_super+0x50/0x50 [ 977.733829] ? ns_test_super+0x50/0x50 [ 977.737839] ? set_bdev_super+0x110/0x110 [ 977.741989] ? ns_test_super+0x50/0x50 [ 977.745871] sget+0x137/0x170 [ 977.748969] mount_bdev+0xf8/0x3b0 [ 977.752498] ? parse_options+0xf50/0xf50 [ 977.756544] mount_fs+0xa3/0x318 [ 977.759899] vfs_kern_mount.part.0+0x68/0x470 [ 977.764379] do_mount+0x51c/0x2f10 [ 977.767938] ? check_preemption_disabled+0x41/0x2b0 [ 977.772950] ? copy_mount_string+0x40/0x40 [ 977.777188] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 977.782013] ? _copy_from_user+0xd2/0x130 [ 977.786143] ? copy_mount_options+0x261/0x370 [ 977.790631] ksys_mount+0xcf/0x130 [ 977.794154] __x64_sys_mount+0xba/0x150 [ 977.798133] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 977.802706] do_syscall_64+0xf9/0x670 [ 977.806560] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.811731] RIP: 0033:0x4608aa [ 977.814903] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 977.833784] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 977.841510] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 977.848767] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 977.856018] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 18:42:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x2c00000000000000, &(0x7f0000000040)) [ 977.863442] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 977.870692] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:40 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x400, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x10, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x20000000) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r2, r3) ioctl$sock_SIOCINQ(r3, 0x541b, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:40 executing program 4 (fault-call:3 fault-nth:50): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 977.953522] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:40 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) mount$9p_rdma(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@posixacl='posixacl'}, {@sq={'sq', 0x3d, 0xa566}}], [{@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x03'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fowner_lt={'fowner<', r1}}, {@subj_role={'subj_role', 0x3d, '(/-*:!\xf1['}}, {@subj_type={'subj_type', 0x3d, '/dev/vmci\x00'}}]}}) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:40 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f0000000100)={@my=0x0, 0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000020c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:40 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) write$vhost_msg_v2(r1, &(0x7f00000002c0)={0x2, 0x0, {&(0x7f0000000100)=""/155, 0x9b, &(0x7f00000001c0)=""/255, 0x2, 0x4}}, 0x48) 18:42:40 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@local, 0x1}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="020028bdfc674ede3f15e8440000"], 0x14}, 0x1, 0x0, 0x0, 0xc810}, 0x20004044) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = dup3(r0, r0, 0x80000) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000200), 0x2) 18:42:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x3f00000000000000, &(0x7f0000000040)) [ 978.158345] FAULT_INJECTION: forcing a failure. [ 978.158345] name failslab, interval 1, probability 0, space 0, times 0 [ 978.219588] CPU: 0 PID: 4929 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 978.227412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.236753] Call Trace: [ 978.239355] dump_stack+0x22c/0x33e [ 978.243000] should_fail.cold+0xa/0x2f [ 978.246913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 978.252038] __should_failslab+0x153/0x1b6 [ 978.256283] should_failslab+0x5/0xf [ 978.260007] __kmalloc+0x2dd/0x4f0 [ 978.263554] ? __list_lru_init+0xd3/0x6f0 18:42:40 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r0, r1) ioctl$SNDRV_PCM_IOCTL_DRAIN(r0, 0x4144, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}}) [ 978.267719] __list_lru_init+0xd3/0x6f0 [ 978.271705] ? up_write+0x18/0x150 [ 978.275256] sget_userns+0x723/0xd80 [ 978.278966] ? set_bdev_super+0x110/0x110 [ 978.283096] ? ns_test_super+0x50/0x50 [ 978.287036] ? ns_test_super+0x50/0x50 [ 978.290918] ? set_bdev_super+0x110/0x110 [ 978.295045] ? ns_test_super+0x50/0x50 [ 978.298958] sget+0x137/0x170 [ 978.302054] mount_bdev+0xf8/0x3b0 [ 978.305576] ? parse_options+0xf50/0xf50 [ 978.309618] mount_fs+0xa3/0x318 [ 978.312971] vfs_kern_mount.part.0+0x68/0x470 [ 978.317450] do_mount+0x51c/0x2f10 [ 978.320972] ? do_raw_spin_unlock+0x171/0x240 [ 978.325449] ? check_preemption_disabled+0x41/0x2b0 [ 978.330449] ? copy_mount_string+0x40/0x40 [ 978.334668] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 978.339508] ? copy_mount_options+0x261/0x370 [ 978.343999] ksys_mount+0xcf/0x130 [ 978.347538] __x64_sys_mount+0xba/0x150 [ 978.351503] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 978.356069] do_syscall_64+0xf9/0x670 [ 978.359852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.365033] RIP: 0033:0x4608aa [ 978.368213] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 978.387092] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 978.394794] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 978.402043] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 978.409297] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 978.416556] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 978.423804] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:40 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000100)={0x5, 0x0, {0x55, 0x6, 0x1, {0x1}, {0x5e, 0x200}, @const={0x0, {0x6, 0x8, 0x800, 0x7}}}, {0x55, 0x3, 0xffff, {0x28, 0x6}, {0x1, 0x4}, @rumble={0x1f, 0xfffe}}}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:40 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000100)={0x1, @pix={0x18, 0x5, 0x4745504d, 0x7, 0x0, 0x4, 0x4, 0x3ff, 0x0, 0x7, 0x0, 0x6}}) [ 978.472348] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:41 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x10400, 0x0) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000140)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:41 executing program 4 (fault-call:3 fault-nth:51): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029", 0x2d, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:41 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x307240, 0x0) r2 = accept(r1, &(0x7f0000000140)=@ax25={{}, [@rose, @default, @bcast, @bcast, @null, @netrom, @default, @default]}, &(0x7f00000001c0)=0x80) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x84, 0x2, 0x9}, &(0x7f0000000240)=0x10) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000100)={0x2000, 0x9, 0x3f, 0x7}) 18:42:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4000000000000000, &(0x7f0000000040)) 18:42:41 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r3) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x881000}, 0xc, &(0x7f0000000300)={&(0x7f0000000a40)={0x230, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80000001, @private2}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0xa8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20ec}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffff7f0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2400000}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x43be}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x80, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8c9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x800}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_NODE={0x4}]}, 0x230}, 0x1, 0x0, 0x0, 0x810}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="139b0000000000c09d8fd6f772a80010000c0001"], 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000024000b0f00"/20, @ANYRES32=r6, @ANYBLOB="061177000000000000000000070001006d7100000600050000002000"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000540)={'syztnl0\x00', &(0x7f00000004c0)={'syztnl2\x00', r6, 0x2f, 0x8, 0xe0, 0x2, 0x1b, @ipv4={[], [], @broadcast}, @private0, 0x8, 0x40, 0x1000, 0x3}}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x94, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x9}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0xdb0d}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x7fff}, @ETHTOOL_A_CHANNELS_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0xfffffffffffffe14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_CHANNELS_HEADER={0x4}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x4}]}, 0x94}, 0x1, 0x0, 0x0, 0x48815}, 0x1) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000140)={0x7, 'batadv_slave_1\x00', {0x3}, 0x5da}) [ 978.720080] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 978.744878] FAULT_INJECTION: forcing a failure. [ 978.744878] name failslab, interval 1, probability 0, space 0, times 0 [ 978.769993] CPU: 0 PID: 4989 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 978.777814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.787175] Call Trace: [ 978.789774] dump_stack+0x22c/0x33e [ 978.793417] should_fail.cold+0xa/0x2f [ 978.797308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 978.802417] __should_failslab+0x153/0x1b6 [ 978.806667] should_failslab+0x5/0xf [ 978.808102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5006 comm=syz-executor.0 [ 978.810404] kmem_cache_alloc_node_trace+0x244/0x4d0 [ 978.824782] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 978.827517] __kmalloc_node+0x38/0x70 [ 978.827536] kvmalloc_node+0x61/0xf0 [ 978.827552] __list_lru_init+0x4c3/0x6f0 [ 978.827574] sget_userns+0x723/0xd80 [ 978.851373] ? set_bdev_super+0x110/0x110 [ 978.855509] ? ns_test_super+0x50/0x50 [ 978.859377] ? ns_test_super+0x50/0x50 [ 978.863248] ? set_bdev_super+0x110/0x110 [ 978.867376] ? ns_test_super+0x50/0x50 [ 978.871258] sget+0x137/0x170 [ 978.874352] mount_bdev+0xf8/0x3b0 [ 978.877887] ? parse_options+0xf50/0xf50 [ 978.881990] mount_fs+0xa3/0x318 [ 978.885342] vfs_kern_mount.part.0+0x68/0x470 [ 978.889859] do_mount+0x51c/0x2f10 [ 978.893399] ? do_raw_spin_unlock+0x171/0x240 [ 978.897895] ? check_preemption_disabled+0x41/0x2b0 [ 978.902893] ? copy_mount_string+0x40/0x40 [ 978.907157] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 978.911985] ? copy_mount_options+0x261/0x370 [ 978.916473] ksys_mount+0xcf/0x130 [ 978.920198] __x64_sys_mount+0xba/0x150 [ 978.924154] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 978.928727] do_syscall_64+0xf9/0x670 [ 978.932511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.937678] RIP: 0033:0x4608aa [ 978.940851] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 978.959820] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:42:41 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x200400, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000140)={0x3ff, 0x7ff}) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}}) [ 978.967508] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 978.974760] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 978.982014] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 978.989263] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 978.996514] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:41 executing program 4 (fault-call:3 fault-nth:52): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 979.025738] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5010 comm=syz-executor.0 [ 979.038389] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 18:42:41 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000140)={0x3, 0x0, [0x7, 0x4, 0xfff, 0x10000, 0x9, 0x8, 0x7, 0x4]}) 18:42:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x40b0000000000000, &(0x7f0000000040)) 18:42:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029", 0x2d, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:41 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) prctl$PR_CAPBSET_DROP(0x18, 0xc) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = accept$netrom(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @default}, [@null, @remote, @bcast, @remote, @netrom, @null, @bcast, @netrom]}, &(0x7f0000000180)=0x48) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) signalfd(r1, &(0x7f00000001c0)={[0x4]}, 0x8) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 979.225019] FAULT_INJECTION: forcing a failure. [ 979.225019] name failslab, interval 1, probability 0, space 0, times 0 [ 979.265429] CPU: 0 PID: 5024 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 979.273259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.282614] Call Trace: [ 979.285218] dump_stack+0x22c/0x33e [ 979.288860] should_fail.cold+0xa/0x2f [ 979.292761] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 979.297895] __should_failslab+0x153/0x1b6 [ 979.302141] should_failslab+0x5/0xf [ 979.305873] kmem_cache_alloc_node_trace+0x244/0x4d0 [ 979.310997] __kmalloc_node+0x38/0x70 [ 979.314806] kvmalloc_node+0x61/0xf0 [ 979.318534] __list_lru_init+0x4c3/0x6f0 [ 979.322616] sget_userns+0x74d/0xd80 [ 979.326339] ? set_bdev_super+0x110/0x110 [ 979.330503] ? ns_test_super+0x50/0x50 [ 979.334406] ? ns_test_super+0x50/0x50 [ 979.338305] ? set_bdev_super+0x110/0x110 [ 979.342462] ? ns_test_super+0x50/0x50 [ 979.346356] sget+0x137/0x170 [ 979.349478] mount_bdev+0xf8/0x3b0 [ 979.353029] ? parse_options+0xf50/0xf50 [ 979.357110] mount_fs+0xa3/0x318 [ 979.360494] vfs_kern_mount.part.0+0x68/0x470 18:42:41 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) chroot(&(0x7f0000000100)='./file0\x00') ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@my=0x0, 0x5}, 0x0, 0x0, 0x13}) [ 979.365010] do_mount+0x51c/0x2f10 [ 979.368569] ? check_preemption_disabled+0x41/0x2b0 [ 979.373598] ? copy_mount_string+0x40/0x40 [ 979.377854] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 979.382710] ? _copy_from_user+0xd2/0x130 [ 979.386870] ? copy_mount_options+0x261/0x370 [ 979.391378] ksys_mount+0xcf/0x130 [ 979.394928] __x64_sys_mount+0xba/0x150 [ 979.398910] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 979.403505] do_syscall_64+0xf9/0x670 [ 979.407326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.412527] RIP: 0033:0x4608aa 18:42:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000040c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 979.415746] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 979.434651] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 979.442364] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 979.449637] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 979.456909] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 979.464184] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 979.471456] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4800000000000000, &(0x7f0000000040)) 18:42:42 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="b199d42841a8579d617b13b40004000000001c00"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000100)={'syztnl1\x00', r3, 0x2f, 0x2, 0x20, 0x0, 0x21, @mcast1, @loopback, 0x7, 0x7, 0xabb, 0x7}}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r5 = accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r6, 0xc400941b, &(0x7f0000000800)={0x0, 0x4, 0x9, 0x1}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x48, 0x1409, 0x710, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004881}, 0x10000040) [ 979.527168] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:42 executing program 4 (fault-call:3 fault-nth:53): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:42 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029", 0x2d, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:42 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000100)=0x80000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:42 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x800, 0xa, 0x4, 0x4000, 0x6, {}, {0x4, 0x2, 0x3f, 0x9, 0x5, 0x6, "c96f8c32"}, 0x0, 0x2, @fd, 0xffffffff}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 979.646971] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 979.665602] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 18:42:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x4c00000000000000, &(0x7f0000000040)) 18:42:42 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) dup2(r1, r2) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, {0x4, 0x8, 0x3, 0x7fffffff}}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) [ 979.777199] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 979.870852] FAULT_INJECTION: forcing a failure. [ 979.870852] name failslab, interval 1, probability 0, space 0, times 0 [ 979.918169] CPU: 0 PID: 5077 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 979.926001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.935380] Call Trace: [ 979.937980] dump_stack+0x22c/0x33e [ 979.941625] should_fail.cold+0xa/0x2f [ 979.945525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 979.950643] __should_failslab+0x153/0x1b6 [ 979.954883] should_failslab+0x5/0xf [ 979.958602] kmem_cache_alloc_node_trace+0x244/0x4d0 [ 979.963722] __kmalloc_node+0x38/0x70 [ 979.967535] kvmalloc_node+0x61/0xf0 [ 979.971256] __list_lru_init+0x4c3/0x6f0 [ 979.975326] sget_userns+0x74d/0xd80 [ 979.979049] ? set_bdev_super+0x110/0x110 [ 979.983206] ? ns_test_super+0x50/0x50 [ 979.987097] ? ns_test_super+0x50/0x50 [ 979.990990] ? set_bdev_super+0x110/0x110 [ 979.995142] ? ns_test_super+0x50/0x50 [ 979.999030] sget+0x137/0x170 [ 980.002150] mount_bdev+0xf8/0x3b0 [ 980.005695] ? parse_options+0xf50/0xf50 [ 980.009765] mount_fs+0xa3/0x318 [ 980.013142] vfs_kern_mount.part.0+0x68/0x470 [ 980.017645] do_mount+0x51c/0x2f10 [ 980.021210] ? do_raw_spin_unlock+0x171/0x240 [ 980.025720] ? check_preemption_disabled+0x41/0x2b0 [ 980.030753] ? copy_mount_string+0x40/0x40 [ 980.035001] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 980.039853] ? copy_mount_options+0x261/0x370 [ 980.044355] ksys_mount+0xcf/0x130 [ 980.047903] __x64_sys_mount+0xba/0x150 [ 980.051884] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 980.056476] do_syscall_64+0xf9/0x670 [ 980.060286] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.065477] RIP: 0033:0x4608aa [ 980.068672] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 980.087571] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 980.095281] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 980.102561] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 980.109828] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 18:42:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6800000000000000, &(0x7f0000000040)) [ 980.117095] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 980.124363] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:42 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f", 0x44, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:42 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) 18:42:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6c00000000000000, &(0x7f0000000040)) 18:42:42 executing program 4 (fault-call:3 fault-nth:54): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 980.345754] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 980.375177] EXT4-fs (loop3): get root inode failed [ 980.389868] EXT4-fs (loop3): mount failed 18:42:42 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host, 0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000080c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 980.462269] FAULT_INJECTION: forcing a failure. [ 980.462269] name failslab, interval 1, probability 0, space 0, times 0 [ 980.493704] CPU: 0 PID: 5134 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 980.501523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.510875] Call Trace: [ 980.513470] dump_stack+0x22c/0x33e [ 980.517108] should_fail.cold+0xa/0x2f [ 980.521005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 980.526126] __should_failslab+0x153/0x1b6 [ 980.530368] should_failslab+0x5/0xf [ 980.534091] kmem_cache_alloc+0x2b1/0x4a0 [ 980.538249] ? jfs_destroy_inode+0x210/0x210 [ 980.542662] jfs_alloc_inode+0x18/0x50 [ 980.546557] ? jfs_destroy_inode+0x210/0x210 [ 980.550966] alloc_inode+0x5d/0x180 [ 980.554598] new_inode+0x1d/0xf0 [ 980.557978] jfs_fill_super+0x3a8/0xb50 [ 980.561961] ? parse_options+0xf50/0xf50 [ 980.566032] ? set_blocksize+0x163/0x3f0 [ 980.570121] mount_bdev+0x2fc/0x3b0 [ 980.573762] ? parse_options+0xf50/0xf50 [ 980.577835] mount_fs+0xa3/0x318 [ 980.581219] vfs_kern_mount.part.0+0x68/0x470 [ 980.586078] do_mount+0x51c/0x2f10 [ 980.589634] ? check_preemption_disabled+0x41/0x2b0 [ 980.594654] ? copy_mount_string+0x40/0x40 [ 980.598899] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 980.603747] ? _copy_from_user+0xd2/0x130 [ 980.607994] ? copy_mount_options+0x261/0x370 [ 980.612495] ksys_mount+0xcf/0x130 [ 980.616044] __x64_sys_mount+0xba/0x150 [ 980.620027] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 980.624620] do_syscall_64+0xf9/0x670 [ 980.628433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.633627] RIP: 0033:0x4608aa [ 980.636830] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 980.655733] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 980.663447] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 980.670718] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 980.677994] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 980.685262] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 980.692530] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:43 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@my=0x0}}) 18:42:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f", 0x44, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x6d4f000001000000, &(0x7f0000000040)) 18:42:43 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local, 0x4}, 0x1, 0x1}) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x10100, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000140)) 18:42:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:43 executing program 4 (fault-call:3 fault-nth:55): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7400000000000000, &(0x7f0000000040)) [ 980.927083] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 980.959464] EXT4-fs (loop3): get root inode failed [ 980.987619] EXT4-fs (loop3): mount failed [ 980.998248] FAULT_INJECTION: forcing a failure. [ 980.998248] name failslab, interval 1, probability 0, space 0, times 0 [ 981.022829] CPU: 0 PID: 5182 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 981.030647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.040001] Call Trace: [ 981.042609] dump_stack+0x22c/0x33e [ 981.046252] should_fail.cold+0xa/0x2f [ 981.050153] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.055271] __should_failslab+0x153/0x1b6 [ 981.059519] should_failslab+0x5/0xf [ 981.063242] kmem_cache_alloc_node_trace+0x244/0x4d0 [ 981.068367] __kmalloc_node+0x38/0x70 [ 981.072176] kvmalloc_node+0x61/0xf0 [ 981.075895] __list_lru_init+0x4c3/0x6f0 [ 981.079973] sget_userns+0x74d/0xd80 [ 981.083702] ? set_bdev_super+0x110/0x110 [ 981.087860] ? ns_test_super+0x50/0x50 [ 981.091757] ? ns_test_super+0x50/0x50 [ 981.095654] ? set_bdev_super+0x110/0x110 [ 981.099804] ? ns_test_super+0x50/0x50 [ 981.103698] sget+0x137/0x170 [ 981.106815] mount_bdev+0xf8/0x3b0 [ 981.110362] ? parse_options+0xf50/0xf50 [ 981.114432] mount_fs+0xa3/0x318 [ 981.117814] vfs_kern_mount.part.0+0x68/0x470 [ 981.122323] do_mount+0x51c/0x2f10 [ 981.125876] ? check_preemption_disabled+0x41/0x2b0 [ 981.130905] ? copy_mount_string+0x40/0x40 [ 981.135158] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 981.140018] ? _copy_from_user+0xd2/0x130 [ 981.144175] ? copy_mount_options+0x261/0x370 [ 981.148679] ksys_mount+0xcf/0x130 [ 981.152230] __x64_sys_mount+0xba/0x150 [ 981.156212] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 981.160802] do_syscall_64+0xf9/0x670 [ 981.164617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.169825] RIP: 0033:0x4608aa [ 981.173026] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 981.191926] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 981.199639] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 981.206911] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 981.214180] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 981.221447] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 981.228718] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:43 executing program 4 (fault-call:3 fault-nth:56): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7a00000000000000, &(0x7f0000000040)) 18:42:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f", 0x44, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 981.459926] FAULT_INJECTION: forcing a failure. [ 981.459926] name failslab, interval 1, probability 0, space 0, times 0 [ 981.494257] CPU: 1 PID: 5206 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 18:42:43 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000240)={0x0, 0x800, 0x6, 0x1, 0xa, "d9d8b0b374e5cc3773c5275ed532e513a61255"}) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x80820, &(0x7f0000000180)={[{@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@nfs_export_on='nfs_export=on'}, {@xino_auto='xino=auto'}, {@metacopy_on='metacopy=on'}, {@metacopy_on='metacopy=on'}, {@metacopy_on='metacopy=on'}], [{@euid_lt={'euid<', r2}}, {@subj_role={'subj_role'}}, {@obj_role={'obj_role'}}, {@smackfsroot={'smackfsroot', 0x3d, '#r*'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_appraise='dont_appraise'}]}) [ 981.502082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.511437] Call Trace: [ 981.514040] dump_stack+0x22c/0x33e [ 981.517677] should_fail.cold+0xa/0x2f [ 981.521593] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.526720] __should_failslab+0x153/0x1b6 [ 981.530969] should_failslab+0x5/0xf [ 981.534703] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 981.539378] jfs_fill_super+0xaa/0xb50 [ 981.543272] ? parse_options+0xf50/0xf50 [ 981.547339] ? __mutex_add_waiter+0x160/0x160 [ 981.551840] ? set_blocksize+0x163/0x3f0 [ 981.555911] mount_bdev+0x2fc/0x3b0 [ 981.559540] ? parse_options+0xf50/0xf50 [ 981.563613] mount_fs+0xa3/0x318 [ 981.566988] vfs_kern_mount.part.0+0x68/0x470 [ 981.571487] do_mount+0x51c/0x2f10 [ 981.575032] ? check_preemption_disabled+0x41/0x2b0 [ 981.580048] ? copy_mount_string+0x40/0x40 [ 981.584305] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 981.589156] ? _copy_from_user+0xd2/0x130 [ 981.593317] ? copy_mount_options+0x261/0x370 [ 981.597819] ksys_mount+0xcf/0x130 [ 981.601367] __x64_sys_mount+0xba/0x150 [ 981.605344] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 981.609929] do_syscall_64+0xf9/0x670 [ 981.613737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.618925] RIP: 0033:0x4608aa [ 981.622119] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 981.641022] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 981.648736] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 981.656179] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 981.663450] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 981.670719] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 981.677988] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x7fffffffffffffff, &(0x7f0000000040)) [ 981.722016] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 981.734389] EXT4-fs (loop3): get root inode failed [ 981.739330] EXT4-fs (loop3): mount failed 18:42:44 executing program 4 (fault-call:3 fault-nth:57): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:44 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:44 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x2000, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x40002, 0x4) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(r5, 0x40044104, &(0x7f0000000300)=0x4) getsockopt$IP_SET_OP_GET_FNAME(r4, 0x1, 0x53, &(0x7f0000000240)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000280)=0x2c) dup2(r1, r3) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x90000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1, 0x0, 0x6563}) [ 981.893490] FAULT_INJECTION: forcing a failure. [ 981.893490] name failslab, interval 1, probability 0, space 0, times 0 [ 981.926444] CPU: 0 PID: 5241 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 981.934270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.943623] Call Trace: [ 981.946224] dump_stack+0x22c/0x33e [ 981.949941] should_fail.cold+0xa/0x2f [ 981.953829] ? netdev_bits+0xb0/0xb0 [ 981.957551] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.962676] __should_failslab+0x153/0x1b6 [ 981.966917] should_failslab+0x5/0xf [ 981.970635] kmem_cache_alloc+0x2b1/0x4a0 [ 981.974797] selinux_inode_alloc_security+0xe6/0x2d0 [ 981.979910] security_inode_alloc+0x67/0xc0 [ 981.984242] inode_init_always+0x5a3/0xb70 [ 981.988488] alloc_inode+0x7a/0x180 [ 981.992122] new_inode+0x1d/0xf0 [ 981.995494] jfs_fill_super+0x3a8/0xb50 [ 981.999474] ? parse_options+0xf50/0xf50 [ 982.003547] ? set_blocksize+0x163/0x3f0 [ 982.007621] mount_bdev+0x2fc/0x3b0 [ 982.011253] ? parse_options+0xf50/0xf50 [ 982.015323] mount_fs+0xa3/0x318 [ 982.018700] vfs_kern_mount.part.0+0x68/0x470 [ 982.023211] do_mount+0x51c/0x2f10 [ 982.026766] ? check_preemption_disabled+0x41/0x2b0 [ 982.031787] ? copy_mount_string+0x40/0x40 [ 982.036035] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 982.040883] ? _copy_from_user+0xd2/0x130 [ 982.045038] ? copy_mount_options+0x261/0x370 [ 982.049542] ksys_mount+0xcf/0x130 [ 982.053088] __x64_sys_mount+0xba/0x150 [ 982.057067] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 982.061657] do_syscall_64+0xf9/0x670 [ 982.065469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.070656] RIP: 0033:0x4608aa [ 982.073855] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 982.092761] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 982.100471] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 982.107741] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 982.115015] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 982.122285] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 982.129551] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x8000000000000000, &(0x7f0000000040)) 18:42:44 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@any, 0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000100c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 982.274086] EXT4-fs (loop3): invalid first ino: 0 18:42:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x8cffffff00000000, &(0x7f0000000040)) 18:42:44 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:44 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0xc6800, 0x0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000814}, 0x40010) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000110c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:44 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@any, 0xfff}}) [ 982.508809] EXT4-fs (loop3): invalid first ino: 0 18:42:45 executing program 4 (fault-call:3 fault-nth:58): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x97ffffff00000000, &(0x7f0000000040)) 18:42:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 982.600046] FAULT_INJECTION: forcing a failure. [ 982.600046] name failslab, interval 1, probability 0, space 0, times 0 [ 982.619300] CPU: 0 PID: 5307 Comm: syz-executor.4 Not tainted 4.19.150-syzkaller #0 [ 982.627134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.636498] Call Trace: [ 982.639098] dump_stack+0x22c/0x33e [ 982.642742] should_fail.cold+0xa/0x2f [ 982.646659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 982.651781] __should_failslab+0x153/0x1b6 [ 982.656024] should_failslab+0x5/0xf [ 982.659743] kmem_cache_alloc_trace+0x2b6/0x4b0 [ 982.664422] jfs_fill_super+0xaa/0xb50 [ 982.668314] ? parse_options+0xf50/0xf50 [ 982.672388] ? __mutex_add_waiter+0x160/0x160 [ 982.676915] ? set_blocksize+0x163/0x3f0 [ 982.680996] mount_bdev+0x2fc/0x3b0 [ 982.684632] ? parse_options+0xf50/0xf50 [ 982.688720] mount_fs+0xa3/0x318 [ 982.692101] vfs_kern_mount.part.0+0x68/0x470 [ 982.696610] do_mount+0x51c/0x2f10 [ 982.700171] ? check_preemption_disabled+0x41/0x2b0 [ 982.705197] ? copy_mount_string+0x40/0x40 [ 982.709448] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 982.714297] ? _copy_from_user+0xd2/0x130 [ 982.718453] ? copy_mount_options+0x261/0x370 [ 982.722959] ksys_mount+0xcf/0x130 [ 982.726505] __x64_sys_mount+0xba/0x150 [ 982.730486] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 982.735077] do_syscall_64+0xf9/0x670 [ 982.738887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.744079] RIP: 0033:0x4608aa [ 982.747282] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 982.766185] RSP: 002b:00007fa359855a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 982.773892] RAX: ffffffffffffffda RBX: 00007fa359855b20 RCX: 00000000004608aa [ 982.781171] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fa359855ae0 [ 982.788442] RBP: 00007fa359855ae0 R08: 00007fa359855b20 R09: 0000000020000000 [ 982.795719] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 982.802991] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 18:42:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000220c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xee03000000000000, &(0x7f0000000040)) [ 982.937680] EXT4-fs (loop3): invalid first ino: 0 18:42:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:45 executing program 4 (fault-call:3 fault-nth:59): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:45 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xa65}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xffffffd9}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x67}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x3}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xec, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xc8, 0x2, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xb}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xf}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x94}, 0x1) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r2, r3) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000440)={'filter\x00', 0xac, "1802af07323ca9471950119f4a54834dc1e045ae8fab4c3be2e3833da7c24d3478d07d0fcf5948574296a4dc006feed3c23757064d0792ef8b89842e95e40b1fd974f330783396526b9869c649a50cd969544e3659e298217cf6207a70414e2fdcccf5400f10d45987da72f46b9e58d67103d90f82dab53762775557b95ee4218961d097eb0f791531cb417d5b64c9da129c62e682b81a9f48f19b9c7288f1a3455405cddea0221ff771321c"}, &(0x7f0000000540)=0xd0) connect$inet(r5, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r4, r5) ioctl$IOCTL_VMCI_VERSION2(r4, 0x7a7, &(0x7f0000000100)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xf079249500000000, &(0x7f0000000040)) 18:42:45 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)) [ 983.107963] EXT4-fs (loop3): unsupported inode size: 0 [ 983.125782] EXT4-fs (loop3): blocksize: 1024 18:42:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010002c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:45 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x0, 0x10901) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:45 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x80000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000100)={'nr0\x00', {0x2, 0x0, @multicast1}}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xf5ffffff00000000, &(0x7f0000000040)) [ 983.410259] EXT4-fs (loop3): unsupported inode size: 0 [ 983.420570] EXT4-fs (loop3): blocksize: 1024 18:42:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:46 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000e00)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000019c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_FRAME={0x26, 0x33, @action={@with_ht={{{}, {}, @broadcast, @device_a, @from_mac}}, @sp_mp_open={0xf, 0x1, {0x0, {}, @void, @void}}}}]}, 0x44}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x77}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x40801) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:46 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000100)={0x5, 0x2, {0x400, @usage=0x4, 0x0, 0x8000, 0x3f, 0x7, 0xaae, 0x3, 0x21, @struct={0x20, 0x9}, 0x2, 0xffff8001, [0x9, 0x0, 0x0, 0x10001, 0x81, 0x101]}, {0x7, @struct={0x1f, 0x401}, 0x0, 0x7, 0x3, 0x400, 0x8, 0x7, 0x8, @usage=0x5, 0x385, 0x6, [0xbc8, 0xfb7, 0xfffffffffffffff8, 0x7fff, 0x7f, 0x4]}, {0x4, @usage, 0x0, 0x100000000, 0x0, 0x9, 0x2, 0x400, 0x0, @usage=0x9, 0x0, 0x6000, [0xe76, 0x10001, 0x8, 0xe85, 0x5]}, {0x54, 0x8, 0x20000000000}}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) rt_sigsuspend(&(0x7f0000000500)={[0xfffffffffffffbff]}, 0x8) fsync(r0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:46 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = dup2(r1, r2) write$P9_RWALK(r1, &(0x7f0000000100)={0x30, 0x6f, 0x2, {0x3, [{0x80, 0x2, 0x7}, {0x0, 0x4, 0x3}, {0x80, 0x3, 0x4}]}}, 0x30) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0xc1d) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xf6ffffff00000000, &(0x7f0000000040)) [ 983.644093] EXT4-fs (loop3): unsupported inode size: 0 [ 983.649419] EXT4-fs (loop3): blocksize: 1024 18:42:46 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) sendto$llc(0xffffffffffffffff, &(0x7f0000000100)="940a82dde62f394a15053d8cf3d1d5e43e42f97343aa2f7db5b8b360f2effce6c6115bc6ee97459a6767825a82f6cd699bfc5e2234e0bf9791d9920d67d4dc82ce057aeaf714aa090bc9c12490548311707305956b9ae6ab4dd95b50f8688c71720ad9f7a081e0d202c0d65b73b79c6306fa29fddf441b4260faaad3535ccbf50a486eda", 0x84, 0x4804, &(0x7f00000001c0)={0x1a, 0x308, 0x20, 0x9, 0x9, 0x3f, @multicast}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000280)={0x0, @initdev, @broadcast}, &(0x7f0000001340)=0xc) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host, 0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$vim2m_VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x2, 0x4, 0x1, 0x7fffffff, {r1, r2/1000+60000}, {0x2, 0x8, 0x2e, 0x20, 0xa7, 0x6, "a448decf"}, 0x4, 0x4, @offset=0x3, 0x2, 0x0, r3}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000000340)={{r5}, "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"}) 18:42:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:46 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000140)={{@local}}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000100)=0x6, 0xffffff9b) 18:42:46 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local, 0x1}, 0xc3ad26a1a8a1777b}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x42e300, 0x0) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, 0x0, 0x5}, 0x6) [ 983.871868] EXT4-fs (loop3): unsupported inode size: 0 [ 983.877328] EXT4-fs (loop3): blocksize: 1024 18:42:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfbffffff00000000, &(0x7f0000000040)) 18:42:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:46 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:46 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f00000001c0)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@hyper}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000100)={@hyper, 0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) 18:42:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfcfdffff00000000, &(0x7f0000000040)) 18:42:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 984.576114] EXT4-fs (loop3): unsupported inode size: 0 [ 984.588282] EXT4-fs (loop3): blocksize: 1024 18:42:47 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:47 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x4000, 0x0) getpeername$netlink(r2, &(0x7f0000000280), &(0x7f00000002c0)=0xc) keyctl$read(0xb, 0x0, &(0x7f00000001c0)=""/114, 0x72) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000180)=0x68) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfdfdffff00000000, &(0x7f0000000040)) 18:42:47 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x28, r1, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'xfrm0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x45) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 984.775332] EXT4-fs (loop3): unsupported inode size: 0 [ 984.790301] EXT4-fs (loop3): blocksize: 1024 18:42:47 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0x3}) sched_setscheduler(0xffffffffffffffff, 0x5, &(0x7f0000000100)=0x2) 18:42:47 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000140)=0x10) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@host, 0x2}}) 18:42:47 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xec4, 0x19}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1f}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1a}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x6}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x29}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x24}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@my=0x0}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r3, r4) setsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000280)=0x80, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ocfs2_control\x00', 0x84000, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r5, 0x4148, 0x0) 18:42:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfdffffff00000000, &(0x7f0000000040)) [ 984.931497] EXT4-fs (loop3): unsupported inode size: 0 [ 984.938654] EXT4-fs (loop3): blocksize: 1024 18:42:47 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1, 0x803) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000140)=0x80000) ioctl$VIDIOC_G_OUTPUT(0xffffffffffffffff, 0x8004562e, &(0x7f0000000100)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@local}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r2, r3) dup2(r3, r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r6, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r4, r6) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r5, 0x7a6, &(0x7f0000000000)={{@host}, 0x0, 0x2, 0x200}) 18:42:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:47 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) write$tun(0xffffffffffffffff, &(0x7f0000000100)={@val={0x0, 0x8849}, @val={0x2, 0x0, 0x4, 0x4, 0x44d2, 0x7}, @x25={0x3, 0x4, 0x5, "2bd9767a5cde8c7681854688e8498ee9159d75ba3792f84e49eec6c2a0a1a3eabdd7272dbd45889de2f50c930cb8a00d547b8b0fd03a682967c374441abc087f082d67084726e1390698cd3ff74ad5405f51edd9c53a659cbf9af03e31fa67bcafb513a614a97144da6e907ead7087e8cd3002b60b3918df7fa4e4b7c6997bcf1a77d7698a2a1799c231"}}, 0x9b) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 985.166119] EXT4-fs (loop3): unsupported inode size: 0 [ 985.182898] EXT4-fs (loop3): blocksize: 1024 18:42:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xfeffffff00000000, &(0x7f0000000040)) 18:42:47 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:47 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x6, 0xff}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 985.321779] EXT4-fs (loop3): unsupported inode size: 0 [ 985.327496] EXT4-fs (loop3): blocksize: 1024 18:42:47 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 985.493567] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:48 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) socket$inet(0x2, 0x80000, 0x1) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xff0f000000000000, &(0x7f0000000040)) 18:42:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:48 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f0000000180)={@local, 0x2}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r3 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x10080) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000300)={0x1def630c, 0x3, 0x9, 0x9768, 0x6, 0x8}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={r5, 0x3, 0x6, 0xffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="11188e84", @ANYRES32=0x0], &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x7a, &(0x7f00000000c0)={r6}, &(0x7f00000001c0)=0x10) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000240)="67549b9a1fb5b9abbcfc1a304df55b5fb672bc70b00a65d87326e4d2e702729b7cfa5ee5c6c0732cc16289939e8b557915ad1853bf1640faec5ff5427e1519ce8eb0a4cd4d94642600fa5da794517727bbb43744bba7c8d779bcdc84e77729b5a91cc2", 0x63) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r6, 0x1f}, &(0x7f0000000140)=0x8) 18:42:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:48 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 986.006900] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x22, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:48 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffff030000000000, &(0x7f0000000040)) 18:42:48 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$SNDRV_PCM_IOCTL_DROP(r1, 0x4143, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 986.206177] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 18:42:48 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000001c0)=0xc) setresuid(0x0, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x2008060, &(0x7f0000000240)=ANY=[@ANYBLOB="0000e3000007000000000000000000", @ANYRESHEX, @ANYBLOB="d9040008006e3d", @ANYRESHEX=r2, @ANYBLOB=',cachetag=user_u,posixacl,privport,audit,pcr=00000000000000000053,\x00']) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r6, &(0x7f0000000300)={0x2, 0x0, @rand_addr=0x64010101}, 0x10) dup2(r5, r6) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f0000000100)=0xa0000) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@my=0x1, 0xe45}, 0x1}) 18:42:48 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) [ 986.317844] ================================================================================ [ 986.326639] UBSAN: Undefined behaviour in fs/jfs/jfs_imap.c:458:7 [ 986.332900] shift exponent -1 is negative [ 986.337036] CPU: 0 PID: 5713 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 986.344810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.354140] Call Trace: [ 986.356712] dump_stack+0x22c/0x33e [ 986.360379] ubsan_epilogue+0xe/0x3a [ 986.364075] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 986.370291] ? do_raw_spin_unlock+0x171/0x240 [ 986.374775] diReadSpecial.cold+0x1b/0x3e [ 986.378920] jfs_mount+0x83/0x3d0 [ 986.382366] jfs_fill_super+0x55c/0xb50 [ 986.386324] ? parse_options+0xf50/0xf50 [ 986.390369] ? set_blocksize+0x163/0x3f0 [ 986.394444] mount_bdev+0x2fc/0x3b0 [ 986.398069] ? parse_options+0xf50/0xf50 [ 986.402117] mount_fs+0xa3/0x318 [ 986.405466] vfs_kern_mount.part.0+0x68/0x470 [ 986.409941] do_mount+0x51c/0x2f10 [ 986.413465] ? check_preemption_disabled+0x41/0x2b0 [ 986.418463] ? copy_mount_string+0x40/0x40 [ 986.422682] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 986.427506] ? _copy_from_user+0xd2/0x130 [ 986.431635] ? copy_mount_options+0x261/0x370 [ 986.436111] ksys_mount+0xcf/0x130 [ 986.439632] __x64_sys_mount+0xba/0x150 [ 986.443623] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 986.448190] do_syscall_64+0xf9/0x670 [ 986.451984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.457155] RIP: 0033:0x4608aa [ 986.460350] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 986.479275] RSP: 002b:00007f483be82a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 986.486963] RAX: ffffffffffffffda RBX: 00007f483be82b20 RCX: 00000000004608aa [ 986.494213] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f483be82ae0 [ 986.501476] RBP: 00007f483be82ae0 R08: 00007f483be82b20 R09: 0000000020000000 [ 986.508768] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 986.516015] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 986.523272] ================================================================================ 18:42:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffff1f0000000000, &(0x7f0000000040)) 18:42:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x2c, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:49 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x33, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffff7f00000000, &(0x7f0000000040)) 18:42:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) getdents64(r0, 0x0, 0x0) 18:42:49 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x210000, 0x2) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}, 0x1, 0x0, 0x8}) 18:42:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x34, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:49 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x0, 0x0, 0xfffffffc}) 18:42:49 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', '/dev/vmci\x00', 0x20, 0x8}, 0x31, r1) 18:42:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:49 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) getdents64(r0, 0x0, 0x0) 18:42:49 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000100)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:49 executing program 0: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffffff00000000, &(0x7f0000000040)) 18:42:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x35, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:49 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x80184151, &(0x7f0000000200)={0x0, &(0x7f0000000100)="ded4e067611479b754f1aa537a036062b8fb96aad750f4bb9ae5aa1b74e59ed68425bb328b48f77b80a9ac2771f7088bf420fa9f38c239dda8a06805b8739d5fe306af0aa20634bcd403541d3388f4809b81f0994b753779c9f4c443bf4ec6e405963fd73b660e10954479b91499cc4348ba8185de7266cc31122750112c2fb20112192e576e67bcb0a1d6019b3903ab39b85b89ee504537dc731648474598d66306d91e7fdc67e498ad21122cb3824d76eeffdc8dac327a434d3c8cdb9665052a59cd5633200598ccc99a898c2a5aefa1cb8e", 0xd3}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:49 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000840)=0xb0000) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x48) getsockname$inet6(r1, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000480)=0x1c) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x903100, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000003c0)={@host, 0x2}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r4 = syz_open_pts(r2, 0x5400) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000740)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000007c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000680), r5, 0x1}}, 0x18) prctl$PR_CAPBSET_DROP(0x18, 0x14) sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x160, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x1, 0x3, 0x0, 0x0, {0x800, 0x1, 0x0, 0x5, 0x0, 0x1, 0x1, 0x3, 0x1}, 0xc08, 0xfee9, 0x28}}, @NL80211_ATTR_IE={0xf7, 0x2a, [@perr={0x84, 0xc2, {0x6, 0xc, [@ext={{}, @device_a, 0x0, @device_b, 0x12}, @not_ext={{}, @device_b, 0x7fffffff, "", 0x28}, @not_ext={{}, @device_a, 0x100, "", 0x1}, @ext={{}, @device_b, 0x1, @broadcast, 0xe}, @not_ext={{}, @device_a, 0x7, "", 0x3e}, @ext={{}, @device_b, 0x1ff, @device_a, 0x21}, @ext={{}, @device_a, 0x8, @device_a, 0x3d}, @ext={{}, @broadcast, 0x622, @device_b, 0xd}, @not_ext={{}, @device_a, 0xc2ec, "", 0x3d}, @not_ext={{}, @device_b, 0x0, "", 0x19}, @ext={{}, @broadcast, 0x484, @device_b, 0x3}, @not_ext={{}, @broadcast, 0x80000000, "", 0x3c}]}}, @prep={0x83, 0x1f, @not_ext={{}, 0x8, 0x1, @broadcast, 0x2, "", 0x3ff, 0x1, @device_a, 0x2086}}, @erp={0x2a, 0x1, {0x0, 0x1}}, @gcr_ga={0xbd, 0x6, @broadcast}, @challenge={0x10, 0x1, 0x14}]}, @NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x2, 0x2, 0x7, 0x0, {0xb49, 0xa89, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x108, 0x4, 0x6}}, @NL80211_ATTR_DISABLE_VHT={0x4}, @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x400000, {0x3, 0xaed7, 0x44a, 0xffff}}}]}, 0x160}, 0x1, 0x0, 0x0, 0x40000}, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r6, &(0x7f0000001300)={0x0, 0x9effffff, &(0x7f0000000180)={&(0x7f0000000640)={0x14, r7, 0x309, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0xa0028000}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xcc, r7, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x3}, {0x6}, {0x8, 0x15, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x1000}, {0x6, 0x11, 0xe8d}, {0x8, 0x15, 0xfffffffc}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7a3}, {0x6, 0x11, 0x8001}, {0x8, 0x15, 0x8}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4040000}, 0x8040) [ 987.420389] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:42:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffffffffff0700, &(0x7f0000000040)) 18:42:50 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x4b0041, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@local}) ioctl$CHAR_RAW_HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_GETFB(r1, 0xc01c64ad, &(0x7f0000000180)={0xebb4, 0x20, 0x8, 0x6, 0x9, 0x1, 0x8001}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) getdents64(r0, 0x0, 0x0) 18:42:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:50 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r2}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000240)=0x4) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000100)={0x0, 0x1, {0x1, 0x23, 0x15, 0x1, 0x1, 0xfffff801, 0x2, 0xc, 0xffffffffffffffff}}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:50 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$SNDCTL_SEQ_RESETSAMPLES(0xffffffffffffffff, 0x40045109, &(0x7f0000000580)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000140)={0x394, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE_ASSOC_RESP={0x25, 0x80, [@prep={0x83, 0x1f, @not_ext={{}, 0x5, 0x81, @device_b, 0x200, "", 0xffffffff, 0xc643, @device_a, 0x773d}}]}, @NL80211_ATTR_BEACON_HEAD={0x1d0, 0xe, {@wo_ht={{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x9}, @broadcast, @device_b, @initial, {0x1, 0x1f}}, 0x4, @default, 0x200, @void, @val, @val={0x3, 0x1, 0x3}, @val={0x4, 0x6, {0x1, 0xc5, 0x5a2, 0x1}}, @void, @val={0x5, 0x4c, {0x8, 0x88, 0x81, "6e07c3e6a25d4b9e14627863e9802687a040c0a257884f012bff23c02516ff2f5bba0055f722ac4ae0c6978821ac18dfed9638af6500b6ad76f950abb172d6f264d1e2cf7983a66a92"}}, @void, @val={0x2a, 0x1}, @void, @val={0x2d, 0x1a, {0x48a2, 0x0, 0x5, 0x0, {0x9, 0x81, 0x0, 0x4, 0x0, 0x1, 0x1, 0x3, 0x1}, 0x800, 0x200, 0x3f}}, @val={0x72, 0x6}, @void, @void, [{0xdd, 0xc1, "ebe133e25ef5df6b3e6769c6b6612e119de6a64082aab028de75c888af5e22fad0a2d607f6fe8b7c2d789d6a62b6df393a2add574d6e1fe7938f3468081dc3ca8d4dfd18a3a976644dacb71f82de61102e771b30a3fb311dd64428dacca47dc1f6fa63d0ecfe8bd361809bce912460e7a4ef4d3e9b7d5e7725fae9f3789858c2da1504276f82662e80a3546fd4b5dd6cb7969397683ae438a8d8ce3cfc801ded330f35d638e46eead88582c4d2162335f2df22a96eb0c42cd13c40d733295fbee8"}, {0xdd, 0x61, "206b317be095b656432d2c44a5253c6f2b9066b69230a9d16944b4ddd005943554c7f422563829da30bc36927faa6b950aebeb0cd86da91764487590508668d923b16dd0193aa9a4d8c50d27f5e7a83c81813d7a2c02e7ad83b387a82f5f398528"}]}}, @NL80211_ATTR_BEACON_HEAD={0x180, 0xe, {@with_ht={{{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1}, {}, @device_b, @device_a, @from_mac=@broadcast, {0xd, 0x1}}, @ver_80211n={0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x7, @default, 0x4200, @void, @void, @void, @void, @void, @val={0x5, 0xf2, {0xfb, 0x26, 0x2, "f987c6732787adc3f5d6494cf20e7d636e05bc4f7d86219ecbb2816b00bc9aaa591a977c96432c5093d8deb77c18a0410e5fe03a389b3c3d73773a4b61d22ec4957d3a8c6f8301dd90d8583589b86041ce1ad0d543faf58f7b0fb729b16cdcab7b8cc6bc8bfb1370cd3af9b3194b74fe9342e4f9f376729248e46af75176ab9798fe310d0731061c242d727ec16417d0495551a23a1993bdf3843f82e5482b09710f12954d5d20507d892855202cb9d8aa4a734424c0ea240e3f5d7ebdda7ad558f10ce2f68a19f8ce7b0de7fbf09f19a14c8317075c2689af9cb51df53178fdc9e75706f3f62f96cfdc39af6fcfcf"}}, @val={0x25, 0x3, {0x0, 0xb9, 0x7}}, @void, @void, @val={0x2d, 0x1a, {0x400, 0x1, 0x7, 0x0, {0x9, 0x0, 0x0, 0x20, 0x0, 0x1, 0x1, 0x3, 0x1}, 0x1, 0x7}}, @void, @void, @void, [{0xdd, 0x9, "34561700c6ca375733"}, {0xdd, 0x32, "faeb0c161a2d1fef39f793d6c48c48ddf66d5b72e23e409d11e01ff0887705654ad514a3c5e0b64725b4708c87cb728cbb54"}]}}]}, 0x394}, 0x1, 0x0, 0x0, 0x24000185}, 0x8c0) 18:42:50 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r0, r1) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r0, 0x4122, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:50 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$IOCTL_VMCI_CTX_GET_CPT_STATE(r1, 0x7b1, &(0x7f0000001140)={&(0x7f0000000140)=[0x0, 0x9, 0x8, 0xe7f, 0x5, 0x4, 0x527, 0x10000, 0x98, 0x3, 0x0, 0x0, 0x4, 0x7, 0x9, 0x0, 0x2, 0x8001, 0x8, 0xffffbc62, 0x3, 0x2, 0x5, 0x2, 0x7f, 0x20, 0xffffffff, 0x9, 0x3ff, 0x8000, 0x3, 0xf, 0x7, 0x1, 0x4, 0x7, 0xd211, 0x1000, 0x0, 0x3, 0x1, 0x6, 0x2, 0x5, 0x76605076, 0xc6b, 0x1ff, 0xfffffffd, 0x10001, 0x9, 0xa1d0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x4, 0x1ff, 0x81, 0x80000001, 0x1, 0x0, 0x5, 0x8, 0xe7b4, 0x55, 0xb7d8, 0x7fff, 0x8000, 0xffffff79, 0x2, 0x7ff, 0xfff, 0x7, 0x3, 0x9, 0x3, 0x800, 0x3, 0x9, 0x8, 0x2, 0x3fad, 0x1, 0x101, 0x850, 0xffffffe1, 0x6, 0x7, 0x5, 0x7, 0x3, 0x56b2, 0x0, 0x1, 0x8, 0x0, 0x1f, 0x4bda, 0x100, 0xfff, 0x0, 0x4, 0x6, 0x1000, 0x800, 0x9b1a, 0xfffffeb5, 0x8000, 0x3ff, 0x9, 0x7ff, 0xfffffffd, 0x9, 0x80000000, 0x7ceb9545, 0x3bda, 0xfa2, 0x248, 0x1, 0x4e, 0x0, 0xa1, 0x8, 0x3, 0x0, 0x3, 0x5, 0x7, 0x2, 0x2dfd, 0x1, 0x9, 0x1000, 0x7fffffff, 0x6, 0x0, 0xce, 0xd2, 0x2, 0x6, 0x9, 0x9, 0x3f, 0x400, 0xd7, 0x0, 0x9, 0xfffffe01, 0x8, 0xffc0, 0x0, 0x5, 0x2, 0x7e08, 0x1, 0x8f5, 0x2, 0x3, 0xff, 0x9, 0x4, 0x9, 0x7fbd889, 0x6b30fd18, 0x3, 0x1ff, 0x9, 0xf3, 0x9, 0x84, 0xffffff0b, 0x4, 0x3, 0x2, 0x0, 0x2, 0x3, 0x3, 0x1, 0x9e, 0x4, 0x81, 0x1000, 0x80000000, 0x1, 0x80, 0x5, 0x5, 0x9, 0xffffffc0, 0x19, 0xfffffffa, 0xf, 0xbe7, 0x1000, 0x7, 0x6, 0x1f, 0x5, 0x1, 0x8, 0x10001, 0x2, 0x5, 0x5, 0x7, 0x2, 0x7c1a, 0x80, 0x1, 0x4, 0x3, 0xaf, 0x4, 0x9, 0x6, 0x6, 0x4, 0x1, 0x40, 0xfffffff9, 0x4, 0x4, 0x80000001, 0xfffffffd, 0x4, 0x80000000, 0x7fffffff, 0x1, 0x609f3df2, 0x5, 0x2, 0x1, 0x80000001, 0x80000000, 0x8000, 0x3, 0x6, 0xfff, 0x3, 0x1c, 0x10000, 0x800, 0x39, 0x10000, 0xffffff4d, 0x20, 0x0, 0x101, 0x7, 0x7, 0x8212, 0x3, 0x37f9c659, 0x8, 0x800, 0x80000001, 0x8, 0x7d, 0x8, 0x200, 0xb2cd, 0x7, 0x0, 0x800, 0xfffffffc, 0x48, 0x3, 0x3, 0xffe000, 0x5, 0x8, 0x800, 0x1, 0x3, 0x400, 0x9, 0x8, 0x400, 0x7ff, 0x7, 0x3, 0x200, 0x4, 0x7fff, 0x0, 0x401, 0x3b42, 0x1f, 0x7, 0x6, 0x3, 0x1000, 0x4000000, 0x7, 0x33, 0x7, 0xcb5f, 0x40, 0xffffffff, 0x3, 0x8001, 0xba2, 0xffffff33, 0x5, 0x401, 0x80000000, 0x4, 0x6, 0x100, 0x101, 0x1, 0xffff, 0x0, 0x1, 0x4, 0xae56, 0x7, 0x4, 0x6, 0x4e6, 0xa06, 0x8, 0x7ff, 0x7, 0x0, 0x0, 0x8, 0xd2e0, 0x2, 0x1, 0x401, 0xffffff01, 0x4, 0x2c9, 0x1, 0xd741, 0x80000001, 0x8, 0x3, 0x3, 0x100, 0x7fffffff, 0x8, 0x5, 0x3, 0xffff, 0x80000000, 0x7b, 0x2, 0x4, 0x4, 0xe4, 0x691, 0x80000001, 0xfff, 0x1, 0x5, 0x10000, 0x8, 0x7fffffff, 0x6, 0x7, 0x3, 0x10000, 0x200, 0x3, 0x3, 0x3, 0x7e04, 0xffffaebe, 0x531, 0x9, 0x659, 0x0, 0x6, 0x3, 0x643b7550, 0x8, 0x3, 0x80, 0x1ff, 0x7, 0xfe, 0x200, 0x3, 0x81, 0x0, 0x1ff, 0x5, 0xfffffff9, 0x0, 0x10000, 0xa6, 0x1, 0x20, 0x10000, 0x7f, 0x81, 0x0, 0x742, 0xfff, 0xcd, 0x9, 0x80000001, 0x8, 0x7c81969f, 0x2, 0x8001, 0x3ff, 0xfffffffe, 0x7ff, 0x7fff, 0x8, 0x5, 0xff, 0xffffffff, 0x6, 0x1, 0x200, 0x3, 0x5, 0xfffffffc, 0xb6, 0x6, 0x7, 0x2, 0x6, 0x4, 0x7, 0x7f, 0x7, 0x7fffffff, 0x7408cc8b, 0xc5, 0x7b26256, 0x8, 0x200, 0x0, 0x6a0, 0x6, 0x1ff, 0x5f, 0xfff, 0x2, 0x101, 0x3, 0xf6, 0x200, 0x7fffffff, 0x7fffffff, 0x7, 0x3, 0xfffffffb, 0x9, 0x7ff, 0x3d, 0x2, 0x8, 0x1, 0x3, 0xfffff4f9, 0x6, 0x80000000, 0x7ff, 0x2, 0x8, 0x2, 0x8, 0x2, 0x9, 0x6, 0x20, 0x7, 0x1, 0x4, 0x0, 0x81, 0x80, 0x10000, 0x80000000, 0xe95, 0xfffeffff, 0x80, 0x2, 0x7, 0x2, 0xffffff72, 0x5, 0x92, 0x8, 0x1f, 0x8, 0x2b7, 0x2, 0x101, 0x200, 0x8001, 0x5, 0x380, 0x60000000, 0x8, 0x6, 0x8, 0x1a9, 0xffff, 0x44988, 0x3ff, 0x1f, 0x7ff, 0xefe, 0x0, 0x2, 0xff, 0x7, 0x1f, 0x400, 0x1, 0x7ff, 0xfff, 0x7, 0x7ff, 0x318500, 0x6, 0x8000, 0xfffffff7, 0xa8a, 0x1ff, 0x8423, 0x401, 0x8, 0x6, 0x1f, 0x3, 0x80, 0x3, 0x6, 0x3a000000, 0xffff, 0x80000000, 0xfe, 0x6, 0x800, 0x3, 0x5, 0x8, 0xffffffff, 0xcd, 0x3, 0x100, 0x1000000, 0x10001, 0x9, 0xc200, 0x6319, 0x5a, 0x5, 0x20, 0x2, 0x5, 0x6, 0xb539a97, 0x9, 0x1, 0x7, 0x4, 0x10000, 0xffff, 0x3, 0x7, 0x5, 0x5, 0x9, 0x7, 0x8, 0xc8, 0xa7, 0x5b, 0x22, 0x9, 0x7, 0x80000000, 0x9, 0x100, 0x7f, 0x5, 0x8, 0x6cfa, 0x401, 0x7a2c, 0x5, 0x8, 0x8, 0x1, 0x9, 0x9, 0x8, 0x2, 0x5, 0xffff, 0x5, 0x40, 0x100, 0x1000, 0x7fff, 0x9, 0x1, 0x2fe4, 0x66, 0x100, 0x8, 0xd5c, 0x101, 0x8, 0x8d, 0x3d, 0x80000000, 0x2, 0x2, 0x10000, 0x3, 0x800, 0x5, 0x0, 0x8, 0x1, 0x7, 0x1, 0x1000, 0x9, 0x20000000, 0x0, 0x4, 0xfffffffc, 0x101, 0x0, 0xb80, 0x2, 0x0, 0x1f, 0xffff, 0x2, 0x1, 0x2f72, 0x4b0, 0x80000001, 0xfffffffe, 0xffffff81, 0x5, 0x101, 0x1, 0x101, 0x800, 0x4, 0x1e2a, 0x401, 0x2, 0x1, 0x0, 0x2, 0x5, 0x3, 0x7f, 0xfffffff9, 0x0, 0x7, 0x7, 0x7f, 0x7, 0xffffffff, 0x1f, 0x0, 0xffff, 0x6, 0x235, 0x2, 0x4e625dee, 0x9, 0x7ff, 0x2, 0x2, 0x0, 0x0, 0x2, 0x9, 0xc6cf, 0x4, 0x55, 0x2, 0x5, 0x9, 0x101, 0x6, 0xffff, 0x8, 0x5, 0xf1, 0x3f, 0x6, 0x5, 0x80000001, 0xffff, 0x5, 0x4, 0x7ff, 0x0, 0x4, 0x38f10483, 0x100, 0x6, 0x6, 0x9, 0x8, 0x4, 0x96eb, 0x9, 0x5f4e, 0x2, 0x10001, 0x6, 0xfffffffc, 0x8001, 0x6d, 0x2a338669, 0x3, 0x200, 0x400, 0xd8, 0x1, 0x20, 0x4a1d6def, 0x6, 0x400, 0xb598, 0x4, 0x1000, 0x0, 0xffff, 0x2, 0x3, 0x309d, 0x10000, 0x3, 0xa9ff, 0x200, 0x3, 0x0, 0x6b3208c6, 0x0, 0x2, 0xffffbe69, 0x4, 0x7, 0xd937, 0x6, 0x1, 0x5, 0x9, 0x39, 0xffff, 0x7fffffff, 0x1, 0x800, 0x0, 0x8, 0x1, 0x5, 0x7, 0x78, 0x8, 0x1, 0x1, 0x9, 0x2, 0x3, 0x4bc6, 0x7, 0x5, 0x8, 0x1f, 0x5, 0x6, 0x2, 0x52ab, 0x8, 0x4, 0x4d2e, 0x6, 0xfff, 0x79c, 0x70, 0x51, 0x4, 0x2, 0xa7, 0x7, 0xffff5a0c, 0x9, 0x3, 0x2, 0x5, 0xbe000000, 0x8001, 0x72, 0xfff, 0x1f, 0xfffffffb, 0x7660, 0x101, 0x10001, 0x1, 0x80000000, 0x6, 0x7, 0x3, 0x1f, 0x4, 0x9, 0x1, 0x4, 0x7, 0xb450, 0x7fff, 0x9, 0x10001, 0x4, 0x3, 0x44, 0x7, 0x1ff, 0x5, 0xcd, 0x8, 0xa9, 0xbe71, 0x8000, 0x9, 0x8001, 0xb58, 0x3, 0x0, 0x7, 0x7, 0x89, 0x3ff, 0x6, 0x9, 0x3, 0x9, 0x8001, 0x7, 0xbd4, 0x0, 0x0, 0x5, 0x3, 0x38, 0x8, 0x8, 0x1d4000, 0x7ff, 0x5, 0x6, 0x17df, 0xff, 0xff, 0x8000, 0x2, 0x4, 0x100, 0xcb21, 0x0, 0x5b1, 0x80000001, 0x5, 0x81, 0x9, 0x7, 0x5, 0x6, 0x6, 0xddbb, 0x80000001, 0x1, 0xd02, 0x40, 0x9, 0x80, 0xfc, 0x0, 0x3, 0xf15, 0x101, 0x401, 0x0, 0x4, 0x2020, 0xd3, 0x4, 0x0, 0x2, 0xffff, 0x40, 0x6, 0x1, 0x8, 0x8, 0x5, 0x9, 0x5, 0x4, 0x101, 0x80, 0x0, 0x4c4bc0d6, 0x1, 0x1, 0x4, 0xd168, 0x4, 0x0, 0x2, 0x2, 0x4, 0x3, 0x4, 0x21d3e17d, 0x8df, 0x800, 0x4, 0xffffffc0, 0x400, 0x7fffffff, 0x7, 0xfffffff7, 0x2, 0x1, 0x6, 0x7ff, 0x1, 0x7f, 0x9, 0x401, 0xc3, 0x4, 0x1, 0x8001, 0x3, 0x436, 0x5, 0x0, 0x1, 0xb0d, 0xffffffe1, 0x401, 0x50, 0x9, 0x2935, 0x7, 0x18, 0x1000, 0x0, 0x8, 0x3, 0x4, 0x5, 0xfffffff8, 0x1f, 0x5, 0xfffffc01, 0xb358, 0x8, 0x101, 0x5, 0x645, 0x38, 0x1, 0x180, 0x1, 0x0, 0x5, 0x0, 0x20, 0x7ff, 0xffffff80, 0x3, 0x20, 0x4, 0x7fff, 0x3, 0x0, 0x109, 0x9, 0x8001, 0x8, 0xfffffffb, 0x1a, 0x5, 0x1, 0x4, 0x401, 0x1f, 0x4b, 0x5a, 0x10000, 0x2, 0x7, 0x401, 0x1, 0x7, 0x200, 0x7, 0x8, 0x3, 0x93e, 0x8, 0x3, 0x5, 0x4, 0x820a, 0x8, 0x3, 0x6], 0x3, 0x400, 0x7ff, 0x3}) 18:42:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffffffffffff7f, &(0x7f0000000040)) 18:42:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 987.788693] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:42:50 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x7a, &(0x7f00000000c0)={r3}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r3, 0x7fff}, &(0x7f0000000180)=0x8) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:50 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(0xffffffffffffffff) getdents64(r0, 0x0, 0x0) 18:42:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0xffffffffffffffff, &(0x7f0000000040)) 18:42:50 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000100)={{@host}, 0x1}) [ 987.980830] ================================================================================ [ 987.989451] UBSAN: Undefined behaviour in fs/jfs/jfs_mount.c:385:25 [ 987.995873] shift exponent 63 is too large for 32-bit type 'int' [ 988.002014] CPU: 0 PID: 5892 Comm: syz-executor.1 Not tainted 4.19.150-syzkaller #0 [ 988.009827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.019167] Call Trace: [ 988.021766] dump_stack+0x22c/0x33e [ 988.025424] ubsan_epilogue+0xe/0x3a [ 988.029154] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 988.035300] ? __bread_gfp+0x81/0x300 [ 988.039089] ? readSuper+0xf2/0x290 [ 988.042699] chkSuper.cold+0x1e/0x98 [ 988.046395] ? readSuper+0x290/0x290 [ 988.050093] ? do_raw_spin_lock+0xcb/0x220 [ 988.054331] jfs_mount+0x47/0x3d0 [ 988.057775] jfs_fill_super+0x55c/0xb50 [ 988.061735] ? parse_options+0xf50/0xf50 [ 988.065777] ? set_blocksize+0x163/0x3f0 [ 988.069842] mount_bdev+0x2fc/0x3b0 [ 988.073466] ? parse_options+0xf50/0xf50 [ 988.077521] mount_fs+0xa3/0x318 [ 988.080896] vfs_kern_mount.part.0+0x68/0x470 [ 988.085390] do_mount+0x51c/0x2f10 [ 988.088924] ? check_preemption_disabled+0x41/0x2b0 [ 988.093933] ? copy_mount_string+0x40/0x40 [ 988.098154] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 988.102975] ? _copy_from_user+0xd2/0x130 [ 988.107105] ? copy_mount_options+0x261/0x370 [ 988.111580] ksys_mount+0xcf/0x130 [ 988.115103] __x64_sys_mount+0xba/0x150 [ 988.119080] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 988.123658] do_syscall_64+0xf9/0x670 [ 988.127444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.132621] RIP: 0033:0x4608aa [ 988.135802] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 988.154688] RSP: 002b:00007f483be82a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 988.162397] RAX: ffffffffffffffda RBX: 00007f483be82b20 RCX: 00000000004608aa [ 988.169671] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f483be82ae0 18:42:50 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x78, "8dd872d269c0f46a25b7c49b34113e88242a23b2d26997bd8b2a03ce9705fa594bd67cdc702ead03f1e82a4b300bc1b6a5768c84a5ce4066063ac7720785be5e937c9b04b2aaeac229c63b837225b667e4a87e1488baf80419e41ad6f22989cfb63a2dc3781b0150e56780912e17bcb067b93bb13b85b345"}, &(0x7f0000000280)=0x9c) [ 988.176920] RBP: 00007f483be82ae0 R08: 00007f483be82b20 R09: 0000000020000000 [ 988.184167] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 988.191416] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 988.198758] ================================================================================ 18:42:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) [ 988.278572] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:42:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) getdents64(0xffffffffffffffff, 0x0, 0x0) 18:42:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:50 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) clock_getres(0x7, &(0x7f0000000100)) 18:42:50 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 988.559901] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:42:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000140)={r1}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:51 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@any, 0x1}) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@any, 0x2}, 0x0, 0x1}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') 18:42:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x2}) 18:42:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) getdents64(0xffffffffffffffff, 0x0, 0x0) 18:42:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000792", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:51 executing program 2: ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000100)={0x3, 0x0, 0xffff59c9, 0x4, 0x8000008}) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x942, 0x80000) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000640)={0xac, 0x8000, 0x2, 0x2}, 0x8) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe2(&(0x7f0000000140), 0x800) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000280)) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x8, &(0x7f0000000200)=0x9, 0x4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r2, r4) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r3, 0x7a6, &(0x7f00000001c0)={{@any, 0xd5}, 0x0, 0x0, 0x8009}) 18:42:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x3}) [ 988.912672] jfs: Unrecognized mount option "" or missing value [ 988.968648] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:42:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002", 0x1d, 0x1800}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) getdents64(0xffffffffffffffff, 0x0, 0x0) 18:42:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000079f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 989.108947] jfs: Unrecognized mount option "" or missing value 18:42:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:51 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r7, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}, @TCA_RATE={0x6}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002240)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000002380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002340)={&(0x7f0000002280)={0x8c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000054}, 0x4000004) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x4}) [ 989.286488] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 989.327216] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 18:42:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 989.395317] device bond1 entered promiscuous mode [ 989.406609] IPv6: ADDRCONF(NETDEV_UP): bond1: link is not ready [ 989.421295] 8021q: adding VLAN 0 to HW filter on device bond1 18:42:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000fff0", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 989.452734] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 989.492081] device bond2 entered promiscuous mode 18:42:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 989.497287] IPv6: ADDRCONF(NETDEV_UP): bond2: link is not ready [ 989.499508] jfs: Unrecognized mount option "" or missing value [ 989.510436] 8021q: adding VLAN 0 to HW filter on device bond2 18:42:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$vim2m_VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x6, 0x4, 0x1, {0x1, @pix_mp={0x7, 0x0, 0x30324c4a, 0x6, 0x2, [{0x4, 0x1ff}, {0x200}, {0x0, 0x6}, {0x99a, 0x7}, {0x442b, 0x3}, {0x6}, {0xffffffff, 0x2}, {0xc1, 0x5}], 0x0, 0x0, 0x8, 0x1, 0x1}}, 0x2}) [ 989.561248] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 989.582385] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:42:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) clock_nanosleep(0x0, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000200)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x1, 0x80, 0x5, 0x6, 0x0, 0x9448, 0x11031, 0x1c, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x3}, 0x4068, 0x6, 0xf8, 0x0, 0x7ff, 0x1, 0x5}) 18:42:52 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r0, r2) accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0x1c, 0x800) r3 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r3, 0x7a7, &(0x7f0000000080)=0x110000) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x220100, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r4, 0xc0d05604, &(0x7f0000001280)={0x1, @win={{0x4, 0xf3, 0x3, 0xfffff2f8}, 0x2, 0x0, &(0x7f0000000240)={{0x1808, 0x38c, 0x20, 0x100}}, 0x5, &(0x7f0000000280)="78ccc5fdd3cdbd89c79f40ac7de9f5b665f33b31171f3452143503b1cf57af6a4205961b687e7cfe2ec0cdbc1a573a8b256db1f2f51d7db2b54c2da97ba85efa74b1b3ae77b4205c9a13fdf4d4eda3821727bbb2c49d2589d07c0249bf9991957648fcb22f781bf796e14c390c6d44949764e73fd4bd1ca8e18e7819f64ff8836994bbe7dc83cb59570b71fb5a121f0310b71a6f1474e84b134774db31c7c2cfef9291a62d9a6c4d4d76b44f0dd4456c0245612f7d33f0a2ee41819ef91e8b61d8385d6d5177f00932fc8e291245b676c369f9e0536772ec0d39c5bd15e9ff8dea96e99051a36a590712faefc191c31ef80229945a8e47e6ab9f67d4e4425bb75d5180b1fd2d6dc50cbfe9ae5d3f903b9c7538fee1186215d1136136d2ebc547ee8eed18c6d030e6e6ddb850ac9bd2d59c7ed170c670056fe7d13cd756355d9d26afd1cb1dbbaaff9bc774da355b59f1c1a32049103e5b10a6e6610bc78afcdf10761d084b4fe2926fd17d7088005a8dc7d8a0750282a033ab4c7e60babc3e0f93a46fdf209b15d6d767794836517111858fd88d37c645ba0d86fd4dcc0a97cc9fc6ca6e573c447f6f78b6883bbbe5ba3468026e943b788889d9051701905830dfb3338e1cc1ae40ed8c0e66929f8e1d0cff185cfa59985fb2f742a4ba7834f8720d3e66c0893ea8a1c9057725efae3ca6359adf089ccddb67585e58e5e1356438c4758dadb6cfa088fcae068ca2ccdae0a38bd0dd14b723357d0b1a5112ad6f6ff8f1d0dfd24ee7b365364dc55960c4fb90ed6231c56f4edb24db131471ef2827475b3c5a782c7c30be124612dc8f6d8626d96e54bf86f0c11b36650518f8d1bd86a1f316cdc722b0e692def5bd4161d24ca8352780a1f6c772834cc8386a9d935ef408f47f81cef4780899b8f548647c459764fc9d4dca220510f5f1954be6c3393e4f415722dfcd0a7ad23b6f8caef35a798e0c7cc514fb71c17521cd505b03301a32e6af320f6ad61212844625ef94c6f2074b396a90cf65a605b58a22f7b1c8e7f5e0c6b3f06b24f29cb7d97b44b08d7c53daa8d452f016a4363fe7bf9ecf38dbc77974e91a511ca86c2d2b4e38a999f3f2c19e58bde1099aa8241804a5123e10dc48ce1ee920c3a61d5f078871d969d9453852bf5b2178234b36c5e74a5ae5203f069b1e7760d5139da5d890e72b50dbb6caa15ed71b9792f7886d94ecbe06d8d79bc18593afaac993a596549547f685820c79e39836121c64caba042ff0c0646e05586688d380c32fe89a0e071b64cebb78f9ef69a030505fce15936e134d10b420a79de99197df45514a870c89e4824f8e9d68c8c52f16425d374e9d251062c4ddee0e34e679e24a757c5b1834a4a61db587e3dd5be936cdcfc355b99403a512a3600f41f749aedc57279ca8878a551ebb2580c0766872bfa74ea51a0b7afcd48f1e2744caa69ee0f224a2f306d1a66f03f2fd73f45733a9fc855b2debdd2710b470de464af06f2d47b23511a52b9b0a36e12ed1e0626861959300fb7e18cf99ce77fb612426f0483ae5018e80f4c428dbd37685cfbe2ef97eda3dc8aca0de896c9a41e6d4ca9e1f9a5547758f49d7b6eb53e4ba10bbc41aa65205c38d39c764555a6096fe6c5fe1be2a7e00bfdd22963374a641acae94d7a1d7c2354e76a02933a5751f28b276623c5d831995edbb6474a7975e04c7fce45e4a1c44932bd7981d55bf18af580e0bff9e9921eacd468a457fe5d6a769c5aa83e019ee7729ac9a9c3655d7566482eec31727d1fe2b68a2b0f12b3246073ea071a20d5fe1c5d99776de044dcbf13aad2e34fd987584080850543323b68c1cc0ad437fa62421038d1f35026749066ab8ef2175f0f4dee473491e00adacf1f525b76aaae7d98c207bd1e9d199f5d3ff1f3a11d8b089fb6ba941a3c9eb77c95d2f30fa83d0c65bbc3e9cc5eec8a1772a5c24cd12e661a0939f27c55823f06f72c3379efa5ab3a0261f850a3c047eb7d824212fc3df2c667effb615b6810f21b896a7a575d9e5df1d293151ec0617bf4c39b031bfee86292d6bcb917c91b7bbaaffd0d04a41206ec55725f93a4708cd5aa27ab2df643b18ade41100eef62bccbdd8c503cd89e14f3b4be2ab07b8566a99ad4591e7345246e425948b9ff508a6c3500456853b1f0fe089494edabcca264d90ebf8af974463156834dea7ca7ce13397e47dd122a9d849e6f75f89199c98d7923c095cb44aca3eb81402135d507fd4397b45db0af49af187d45960f7f65acd4c4c531231712fabdca051aa48026892a66edf2ce42a85d0fac868e7949215a95054d2ed8aa26ccbbf319a38e220d52126e280fbfec489b0470f060ba3135f9cb9756cb0a0854fab5c00b4db1d67e6186eb8212a42f7fcff4d76b276dba8006af37ba834f5ceaa08f8fda7d7bcc446b9cb14edfa6b8e64b399050c78505b55da44541845da8bf725b1aa0ab44a02cde800f480766c9d027c023e7297ed628aae7b0344048d6704e56fc088edb367ea423a8508c635abf36f17ca0aabc7a87e09ffae87701a29db745430e0acdf84c70aacdb073d42c21bfc32bef4f756238aec32367d9ebcf0ef628e65dc36308361435a7356f7d3ddf665daef69da69c2d36e9750a317da365d3ca279008ca6ff35fb3fef5ab3f4f74bc621baa59e76393d15c1da6c78a168338e214ffc8b9e21afd55793d47811aba6f9eaf5330281e98a8d11485871efdca8fdfa660fb4b794088553242053892da5ca7c46d24ed1f16606527f91d2b43d63a641f0409eeda406309aedff79fa518ae8a5bdeb707934efa2dd9827d45b0c2204db5e5e3068c0cd1811e34f72f97ab117aabbe70f3202dbf20a2fb760a3d31c013318f4f4a70e1a215521791dea6c842d16c1ad8f0573b324f26c44f64c5fd85e3aa9479c6283537dd9d0f9c99088ee339a4e6b27b5acdf69855fbb6c785b70000e32aceb2222e063b23603077f0b2b3b443a6d958c9b1c0f89eb5a8b4a1ac11cfa668e5fe20f862373eed5df36e916e685f053bd56cd4dc6e6389ff1f7580cb3fb0061701b576cd5fa3eac8e2279b21a8680d8152837f8411260ef88c3dbe95f0eed08915201bdc3095623626689ce30d254c607ab126255d2a63652c4b8d8816bcdf01a5039840d7532ab75fc3a0d5d6faad8d530034e56846cda891b661d4a193ff5ce904f5516855e932598e5bc6a13e26a0143c85c878e7e93eff848260d185f960577191a4aaa2c5afa58a0d36978e58ecf9da7790d9cfd556eec94757d2bbe9969544b2c7e38df66b085b1137264472298f7b85d97d2f215d45488aea0dea502b52a8295e05d05d628097bd8733e80ca994dadd15b66f63a906e84f09bfccd2721fd77dd579492b290363d89d9e604115608611886d2fb5ef009115e6b17669c32411dd7f9a2ee76e2b413543f71f0f7b893a5449f0b78dc687f12db417f62b60999897b53b46958c366b941c44e77c8715325705513ad6dfe99c3c670a9d2e06d06e10ea2452c5a2b49107ffa3c116b67548e4e45e8e1aa4dde30c92eac6b3676f6dfd9a6ea59e5eb34c260083f4d4177b71bdd665fddcf830240e3b7d0239622954c4dafacafd21d1c9d13a254ebad67f7de206dca3bfe0f37bb46145ab8837c74a4d814fa9b774fc0777d1a3a162e139d43ee0a175fb3c2bca7b5eed1c2778a58c5d16f7b21640f4f069f595bc5b534b806749f1015667afb267c0b8b337571a868ce267ddf1424fdf3b1075ca95d2d95b09bd0c4d989fff00f9bc4832da074d95bdff256cbc5ef79f844f8b9828d51df20865c595d5aef3d241362711edb1adb7308f7d50e7f5c74ab4d207cedf843a4b599043f0ff4a2dd27d53b2addd7aa81d949e444e98da3e7b0aa4b60fd90363a53a8f4dae41e518356c37bfa9d8187bec06349839570ccc6904a4faf85815eadee21ec06dae1a8c71d216ef548de947875dee6bc8340350dd171b60b972b4235f8a22056e20197d6f51f7e6f4505fea07bec959f76b1fb494518b5be338db47fc3fb5d80d52592b6ddc1965a30e4bf62f2597368ab854ba87912c9d13bc3bb53b44d60ed0f105c577514b8b8f1cb2c4ed2501fcb6a0fbe1ace8ff5f11903121822766b24d24e01b97270dcc5f512b178c22fd4af2a890eb10482ff0ba5c5982d37f3b1e46c9f1a772798239ebb38b8d47500e4622f85646a159752e33bb829c8accf6fee109feee0654649eea40ef5ba820c2e96f1a02bdf6701bc403b33df0b9a601bdfa2da96b5461bc1b1fd30d154124d4ae251c6d264d895356bf256152c03606ec160feefdea2d2cab2658e1ae82841d5555f9d476208e16fe6beba32bae8caf2942a81d9f9d3411b89eb043123439ae74cb10e4ba756ef5c8fdbac598cefc0d4764ac38f2b1274c520f4aa84945969e5b666c0595517e501e49ba79cda3f59b950382e888c8b30e2ed675e5907a164f90fc02d2dfa6a1768a36659c20b6e3f1a5bca7a477960e3eaae759578b6f13671079b220f78368daaf3f408aff467cc473463ed46b666f353c2832f1e5efea66ed2497bee201680f3e853f0f0be491410fac8aa808ae721228659ad619297d24c4f03359ce1926ca3f24bd1a3a65652d1071ff1903a7b2b84e9e0af0d3aeb8cb6e6a592538efa3ed5443f4e0ff2db6fa6a73d4004f6783b0754470d318835fb357c41bd729a2cc34eb8aaa933cf812d80e449017b6f38440c4cbd683b0c04cc0edc21cd6989a31fa21819223f85cc3775cb6a0292a26bd1eafa10626b1aef38446ae6168a207662244ba1535872b64570bf970f87777686db49c2302011b926153c906e3c59fe423b7a18aa9351a9c1bbdc115704221ae986ada864fa3ef703df900cc5c38d9216a11d3c2a153bb14eb7462c2ed8ec39cce7dbd8b36ba24eda35f2baaf95bfc830c48f853e82d2ac5f947ee3a6d36334cf39e5b4803ec20e69e07b0986c44f1add133c896cc6830903f71e9d04ee0f526f319805fd4966d52b02fb912ea295bd7b3729af79dc452d9c712286bf097b271ddd907cf82384f3bfd1d62da1ab198eca1f430c70d6dd58a4e9461c2f9dd7e076b2f3c69f64b5dcb0c4728474e1e270f48447809d74d66c1facb1b6b783afa565d19f48eb7651d3161ac6923d676a38a03ddd50258f6e7a5dfaa568d5f52cf241148ad9bb3b81b48b9acf5ddf719059e56c9903f4eb09dcacba3fbd6a67109b19cb277e4acdd6ec900e6ceb5cff5a127678625902f1e9fecc7929539bf1d602583696c7c0bf6fa597041d078683f0d23bb08282748dabfb072b6e21433c21efab1e2beddf452337a66f55ab11a03d7a9c729f3e778bac0229c4aaf551002532058b89d10223b7ba7a0a9341ac7c249cfc6225a1b4f1b1331d5f66e8d7e50988103dba59cdd8dbeb9c6eba9e74df20fc1a0630806cb66d9904ba9a80ad2c933bb05078f06e026db0a4f4ec7bb8112f438369fdc46a45ba07adb7e46315af5d0df5de65f78ed85f62220651430a467eee7aa910ed58dd51c079be57079633e0a53ff484eb81aec469b0da3b62db6f22f041f9be330d8bbdae3570e4d1d84fa9d565322a023f00efd5ea88dc0d26f40b303d32e449bed0990e615c796f7dff6a2cfd7089c4c41de12243365f40ddbb683926a3d8e9203375b415579c2d8ffefa76ae8573b3a28547d11144bcdc5e9c3a632b2536d68131efe5f28380acaf34bb26014a1b0438b582afe1b9d170b9df923bd422c7b3e73dd50571c137c11999b6f183d83ad80d57408b680f1a157d96ad", 0x3f}}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r3, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r3, 0x7a6, &(0x7f0000000000)={{@local}}) r5 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000001380)={'batadv_slave_1\x00'}) 18:42:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x5}) 18:42:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000fc", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000100)=""/203, 0xcb, 0x2, 0x0, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x2, 0x4}, 0x6}}, 0x18) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) ioctl$SNDCTL_DSP_GETIPTR(r1, 0x800c5011, &(0x7f0000000140)) 18:42:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 990.013872] jfs: Unrecognized mount option "" or missing value 18:42:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x68, 0x0, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'snmp\x00'}}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x2, 0x3f}}]}}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x81, 0x1}}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x1, 0x9}}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x7}, @CTA_PROTOINFO_TCP_FLAGS_ORIGINAL={0x6, 0x4, {0x0, 0x8}}]}}, @CTA_NAT_DST={0xc, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @private=0xa010102}]}]}, 0x68}}, 0x40) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@my=0x0, 0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) accept$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) 18:42:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x6}) 18:42:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@remote={[], 0x3}, 0xf, 'gretap0\x00'}) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@local}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1, 0x2, 0x2}) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) capget(&(0x7f0000000200)={0x20071026}, &(0x7f0000000240)={0x5, 0x8, 0x2, 0x8, 0x8, 0x5}) 18:42:52 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) semctl$SETALL(0x0, 0x0, 0x11, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000240)=0x10000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) accept4$alg(r1, 0x0, 0x0, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$DRM_IOCTL_MODE_GETENCODER(r2, 0xc01464a6, &(0x7f00000001c0)={0x101}) dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x30000008}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000100)={{0x2, 0x4e23, @rand_addr=0x64010101}, {0x306, @link_local}, 0x4, {0x2, 0x4e22, @rand_addr=0x64010101}, 'vlan1\x00'}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x80000001) 18:42:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r1, r2) accept$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000a40)=0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000b00)={'ip6tnl0\x00', &(0x7f0000000a80)={'sit0\x00', r3, 0x29, 0x7f, 0x3f, 0xffffff71, 0x1, @rand_addr=' \x01\x00', @empty, 0x80, 0x7800, 0x2}}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000100)) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x801, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000240)=0x1000, 0x4) [ 990.298900] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure [ 990.322119] jfs: Unrecognized mount option "" or missing value 18:42:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000010", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:52 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000180)={0x0, 0x5, 0x1, &(0x7f0000000140)=0x200}) 18:42:52 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) semctl$SETALL(0x0, 0x0, 0x11, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000240)=0x10000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) accept4$alg(r1, 0x0, 0x0, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$DRM_IOCTL_MODE_GETENCODER(r2, 0xc01464a6, &(0x7f00000001c0)={0x101}) dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0x30000008}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000100)={{0x2, 0x4e23, @rand_addr=0x64010101}, {0x306, @link_local}, 0x4, {0x2, 0x4e22, @rand_addr=0x64010101}, 'vlan1\x00'}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x80000001) 18:42:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x7}) 18:42:52 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r1 = socket$kcm(0x29, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r2, &(0x7f0000000240)=""/101, 0x65, 0x2000, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) dup2(r2, r3) bind(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @local}, 0x0, 0x2, 0x2, 0x2}}, 0x80) 18:42:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@hyper}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00'}) 18:42:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 990.579865] jfs: Unrecognized mount option "" or missing value 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x118) 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000180)={0x2, 0x101, 0x101, 0x731, 0x3ff, 0x6, 0x1f}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(0xffffffffffffffff, 0xc1004110, &(0x7f0000000100)={0x2b2eede5, [0x80000001, 0x6, 0x56680000], [{0x800, 0x2, 0x0, 0x0, 0x0, 0x1}, {0x3ff, 0x0, 0x0, 0x1}, {0x80000000, 0x3, 0x1, 0x1, 0x0, 0x1}, {0x8, 0xbaca, 0x1, 0x0, 0x1}, {0x57c7, 0x1f, 0x1, 0x1, 0x1, 0x1}, {0x100, 0x3fc00, 0x0, 0x1, 0x1, 0x1}, {0x6d, 0x5, 0x0, 0x1, 0x1}, {0x8, 0x4, 0x0, 0x1}, {0x6, 0xc8d, 0x0, 0x0, 0x1, 0x1}, {0x0, 0x3354ede6, 0x0, 0x1, 0x0, 0x1}, {0x13, 0x8, 0x0, 0x1, 0x1}, {0x1, 0x8, 0x0, 0x1, 0x1}], 0x8}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000200)={0x4, [0x4, 0x7f, 0x9, 0xb8e]}, &(0x7f0000000240)=0xc) getgid() 18:42:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x8}) 18:42:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x2200, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x118) 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000180)={0x2, 0x101, 0x101, 0x731, 0x3ff, 0x6, 0x1f}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000100)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@hyper}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 990.811497] jfs: Unrecognized mount option "" or missing value 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000180)={0x2, 0x101, 0x101, 0x731, 0x3ff, 0x6, 0x1f}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @rand_addr=0x64010101}}}, 0x118) 18:42:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x9}) 18:42:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000100)=0xf8000000, 0x4) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000140)={@local, 0x1}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000180)={0x2, 0x101, 0x101, 0x731, 0x3ff, 0x6, 0x1f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x2c00, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) pipe2(&(0x7f0000000140), 0x80000) 18:42:53 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0xeaef, 0x111c40) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000500)=0xb0000) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000600)={'sit0\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x2f, 0xfe, 0x5, 0x7, 0x10, @private2={0xfc, 0x2, [], 0x1}, @mcast1, 0x20, 0x0, 0x3, 0x2}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x2c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x20}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_mount_image$hpfs(&(0x7f0000000140)='hpfs\x00', &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000200)="79cdaf97b0cd57a0a620ffd63724e776d7f418c8a00f5d8b7ca8a6970a661185f75708533f91121a6ec295f357a06861b2b609d18c738f", 0x37, 0x400}, {&(0x7f0000000240)="75ba4b82a55019e01476b8d5d3b4ee7574d0a8ecf2f6b1a358b1", 0x1a, 0xffffffffffffffff}, {&(0x7f0000000280)="6e18d853b980eab025cedaae6244db6299c064a03d5f1818c8fdb349f7ea5327603f5fe7d567785e357c5acae64e9b530c9c76577a7ba1866c40f2f1a3258a73d3d551c1fdbde0f1dfa88d52a5449740cb8e406f9e3a60313499f2bac753e5bc41895d31b5852d963696374f1573a71685665b516184b9b5970833470ffc", 0x7e, 0x80}, {&(0x7f0000000300)="821351cc1cfae7a44f13c2a33d28514dc4a14b3d6e6ad9908413a5d64611c90c8689ba60d68df690314ad7335e2d88768b60da9d928fcd3c72287f18b78f9f56449f8e99ac953852da4ffc71cc95929ddc2a2f9721a4ef71f126acdfadce652311605ab9e64468ccfd55830c229bcbd06027ba7fd3874ade1f40276ef5157f16995ecc9bafeaa7691af9a8e55027844e86fb929c337bf9d40e9c24f9bf3cc6ffb51ef944ec1e8ffa527adce33ebb5db824", 0xb1, 0x8001}], 0x10000, &(0x7f0000000440)={[{'/dev/vmci\x00'}, {'!^'}], [{@fsuuid={'fsuuid', 0x3d, {[0x35, 0x35, 0x37, 0x36, 0x33, 0x37, 0x31, 0x36], 0x2d, [0x30, 0xf, 0x33, 0x32], 0x2d, [0x38, 0x32, 0x62, 0x65], 0x2d, [0x56, 0x36, 0x61, 0x38], 0x2d, [0x65, 0x33, 0x0, 0x36, 0x32, 0x66, 0x31, 0x33]}}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@dont_measure='dont_measure'}]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @private=0xa010102}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={r4, 0x1, 0x5}, 0x10) 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000180)={0x2, 0x101, 0x101, 0x731, 0x3ff, 0x6, 0x1f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) [ 991.051679] jfs: Unrecognized mount option " " or missing value 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0xc}) 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000180)={0x2, 0x101, 0x101, 0x731, 0x3ff, 0x6, 0x1f}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000f0", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x3300, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:53 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) [ 991.319764] jfs: Unrecognized mount option " " or missing value 18:42:53 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000f0", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:54 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x3400, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000fc", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x10}) [ 992.084761] jfs: Unrecognized mount option "" or missing value 18:42:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000092", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:54 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) r1 = syz_mount_image$sysv(&(0x7f0000000100)='sysv\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000180)="cc60c47821da3c7313cab5f0bd74d66e9f74c98ce42c484b86e8f3bb69d525e77b3d8c356699d0b67ffdd831c4c265a52b8dd10caba068a19b870a27faa62e5597bcba99763269143c667582312cfbdf1e47a1fa131a7a07684503413b9aa39b54ed70d2907949", 0x67, 0x1}, {&(0x7f0000000200)="3be8904652fe41db251f50fb9efd392181fabbaf297b11c9d88d", 0x1a, 0x4}, {&(0x7f0000000240)="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", 0xfb, 0x3b}, {&(0x7f0000000340)="9b080ee1e92a423203966f2cc7d1bfe3964fd811cfde302bbe9afbc49de226de218559b33bde7b4f2a97e8b141a5cf2dcd496c0abca267efd12e05f0b7f67f5d1769f107835b4bcf6582169d84d6a8699a88e0fe377abebf46fba2943ae47e5f6ae111", 0x63, 0xffffffff}, {&(0x7f00000003c0)="c1ae07d03d2c2cdfa945f14d0f11a1bf87cd1175af285f9c46c7330e0d218295d2744df5d9d63dab485493df37205881724e6fa58b3891102960fc2816aa8d2aef10d88a79a145630d9b6fd1e95071adb21e4d8788920faa46b72d1b411edcd10f10c48d7cdcf3d932c21786dc6e7fbe2ecb3157d52708e7b3c9efbe6f950e4c6834ff0ef8f8f54e9ea49d6540a94309a12018db21e92dafc1a6120a6aac9493fc413c63dace72221e50a0c56430914f4b0e72b9f6b1c9df7914e27167593d97188b53f86f9bce1db5c1", 0xca, 0xfffffffffffffffd}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="2f6465762f766d6369002c282c2e2ce55b2c2f6465762f766d6369002c2c2c2f6465762f766d6369002c2c2f6465762f03000000002c2f6465762f766d6369002c7375626a5f757365723d2f6465762f766d6369002c736d61636b66736861743d2f6465762f766d6369002c7375626a5f747970653d5d2925392a295b2c00"]) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}}) 18:42:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:54 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x11}) 18:42:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x3500, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x9e5c, 0x1, 0x80, 0x80000001}, {0x81, 0x1, 0x40, 0x4}]}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000009f", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:54 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:54 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) [ 992.371480] jfs: Unrecognized mount option "" or missing value 18:42:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x9e5c, 0x1, 0x80, 0x80000001}, {0x81, 0x1, 0x40, 0x4}]}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x12}) 18:42:55 executing program 3: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000f0", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 2: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x9e5c, 0x1, 0x80, 0x80000001}, {0x81, 0x1, 0x40, 0x4}]}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 3: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) [ 992.607725] jfs: Unrecognized mount option "" or missing value 18:42:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 2: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:55 executing program 3: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x22}) 18:42:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000fe", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 2: ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) [ 992.891422] jfs: Unrecognized mount option """ or missing value 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e20, 0x92, @local, 0x8}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x42, @local, 0x2}, @in={0x2, 0x4e22, @private=0xa010100}, @in={0x2, 0x4e21, @empty}], 0x78) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000f0", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x23}) 18:42:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000380)={0x1, 'ip6gretap0\x00', {}, 0x9}) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) [ 993.248579] jfs: Unrecognized mount option "#" or missing value 18:42:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000f0", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:55 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x2c}) 18:42:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb6a00fa31562e5d89ddf03e0159af5cdc628b1e002b13bfee9943a4f43882cd17aeae386e0f10d61a315d2c371cfc09a4ed48d978b5ea6b353cf79eeafc19eca1f9fe0764c16e7c3dcceed7f14362159e28b3c9a4726e400a1b190bc245ce86940a136d5dd723dda1"], 0x6a, 0x2) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:55 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:55 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r2, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000ff", 0x15, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x48}) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x25, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 993.790233] jfs: Unrecognized mount option "H" or missing value 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x4c}) [ 993.934153] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.934153] 18:42:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_INIT_CONTEXT(r2, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r2, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x5f, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) [ 994.049025] jfs: Unrecognized mount option "L" or missing value 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x68}) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) [ 994.171306] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 994.171306] 18:42:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0xfc, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 994.273000] jfs: Unrecognized mount option "h" or missing value 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="1c", 0x1}, {&(0x7f0000000240)="85", 0x1}], 0x2}}], 0x1, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x6c}) 18:42:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:56 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:56 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) [ 994.450639] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 994.450639] 18:42:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) [ 994.496463] jfs: Unrecognized mount option "l" or missing value 18:42:57 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r1, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r1, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r1, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x7ffff, 0x8000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x74}) 18:42:57 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) [ 994.761772] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 994.761772] [ 994.775487] jfs: Unrecognized mount option "t" or missing value 18:42:57 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:57 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x4}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:57 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0x7a}) 18:42:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:57 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:57 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x2000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 995.028414] jfs: Unrecognized mount option "z" or missing value 18:42:57 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:57 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:57 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)={[], [], 0xff}) 18:42:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x6b6b6b, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:57 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:57 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x4000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:57 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:57 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:57 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) [ 995.410753] jfs: Unrecognized mount option "ÿ" or missing value 18:42:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x6000}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:58 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000100)={0x1, 0x3, 0x7fff, 0x3f, 0x100, 0x3f}) 18:42:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}], 0x0, &(0x7f0000000040)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 18:42:58 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:58 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, 0x0) 18:42:58 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(0xffffffffffffffff, 0x7a6, &(0x7f0000000000)={{@hyper}, 0x0, 0x0, 0x2}) 18:42:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x7f00}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) 18:42:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x1000}, {&(0x7f00000002c0)="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", 0x12c}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d6134060000006e6945ea2c646973636172643d3078303030303030303030303030303166662c646973636172643d3078303030303030303030303030303030352c6572726f72733d636f6e74696e75652c6e6f71756f74612c646973636172643d3078303030303030303038303030303030312c696f636861727365743d63703836352c71756f74612c726573697a652c71756f74612c001ebf8a4cc6cbd062c1f5cfa97ddc3063b9e81b106ed6f574fa3d8dbf4231e24835061d71947e4e45f3906b2d0d593a96a9ee2af648a4666c6e0b1b6ffce889109ad7df77e053d38d42f19b79562b7b7e702dee3c567c"]) 18:42:58 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:42:58 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, 0x0) 18:42:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8002}, {&(0x7f0000000140)="10c4645f010000000100000001000000040000000b000000002081aaac1a65f3b3bdd577f017023fdf46949121eb3633c2766292436564b1", 0x38, 0xb200}], 0x0, &(0x7f0000000040)) [ 995.877975] JFS: charset not found 18:42:58 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x2000}], 0x0, &(0x7f0000000040)) 18:42:58 executing program 2: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, 0x0) 18:42:58 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, 0x0) 18:42:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) [ 995.945924] JFS: charset not found 18:42:58 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, &(0x7f0000000080)=0x110000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@host}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a6, &(0x7f0000000000)={{@local}, 0x1}) 18:42:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x242081, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @aes256, 0x8, [], "db193dee8473ac52450521a28eae32f6"}) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e21, 0x9, @private1, 0xfffffe24}, {0xa, 0x4e20, 0x380000, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x5}, 0x80, [0x3, 0x7, 0x5, 0x7, 0xff, 0x1, 0x3, 0x18]}, 0x5c) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f000