00000000c0)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000100)={r4}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @remote, '\x00\x00idwe_sla\x00\x00_0\x00'}}, 0x173) dup2(r0, r2) socket$bt_hidp(0x1f, 0x3, 0x6) 07:21:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000080)=0x7, 0xfc9, 0x1) r3 = semget(0x3, 0x3, 0x5) vmsplice(r2, &(0x7f0000000d00)=[{&(0x7f0000000c80)="6868dd555907ec124bb15bb0d6579291752886c892bf19aad7f9ea916380e22ccccf24818e03f4d8745a", 0x2a}], 0x1, 0x4) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000400)=""/155) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt(0xffffffffffffffff, 0x3, 0x1, &(0x7f0000000340)=""/182, &(0x7f00000004c0)=0xb6) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000640)={"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"}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000040)) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x40, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000a40)={0x0, 0x0, @pic={0x70b, 0x0, 0x8, 0x6, 0x80, 0x7, 0x4, 0x75, 0x1, 0x0, 0x62, 0x2, 0x10000, 0x400, 0x0, 0x9}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000001c0)={0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000b40)={0x26940000, 0x1, {0x0, 0x3, 0x5, 0x3, 0x9}}) 07:21:49 executing program 1: mmap$binder(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1000002, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x24, &(0x7f0000000280), &(0x7f0000000040)=0x4) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) 07:21:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept(r1, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000140)=0x80) pipe2(&(0x7f0000000180), 0x4000) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x401, 0x111000) syz_open_dev$vcsa(&(0x7f00000005c0)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x40800) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x800, 0x200000) creat(&(0x7f0000000640)='./file0\x00', 0x12) r3 = openat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x200000, 0x90) ioctl$RTC_PIE_OFF(r3, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) kexec_load(0x101, 0x1, &(0x7f0000000540)=[{&(0x7f00000001c0), 0x0, 0x0, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000340)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)=0x6) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x3, 0x0, 0x5, 0x3, 0x0, 0x8, 0x0, 0xf, 0x2000000000000000, 0x2, 0x3, 0x3585, 0xcde9, 0x3, 0x81, 0xffffffff7fffffff, 0x0, 0x0, 0x8, 0x0, 0x1, 0x86a, 0x0, 0x7, 0xfffffffffffffeff, 0xffffffffc76eb886, 0x5, 0x2, 0x5f, 0x2, 0x0, 0x8, 0x1, 0x5be, 0x3, 0x0, 0x0, 0xef, 0x4, @perf_config_ext={0x5}, 0x802, 0x1, 0x9, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7ff, 0x4, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000400)={0x1, 0x208}, 0xffffffffffffff47) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x3f}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r4}, 0x8) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)={0x0, 0x81}) readlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/30, 0x1e) 07:21:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'syzkaller0\x00', {0x2, 0x4e21, @multicast1}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffffffff1b7a, 0x2400) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00005918020009000300060004000900"], &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0xd0, @remote}}}, &(0x7f00000000c0)=0x84) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) 07:21:49 executing program 1: mmap$binder(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1000002, 0x100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x24, &(0x7f0000000280), &(0x7f0000000040)=0x4) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) 07:21:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x4000000000000006, 0xbbb) ioctl(r1, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x6, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}}}, 0xfe95) mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x24b) 07:21:49 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000"], 0x2a) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)=0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000001c0)=""/196, 0xc4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) 07:21:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000080)=0x7, 0xfc9, 0x1) r3 = semget(0x3, 0x3, 0x5) vmsplice(r2, &(0x7f0000000d00)=[{&(0x7f0000000c80)="6868dd555907ec124bb15bb0d6579291752886c892bf19aad7f9ea916380e22ccccf24818e03f4d8745a", 0x2a}], 0x1, 0x4) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000400)=""/155) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt(0xffffffffffffffff, 0x3, 0x1, &(0x7f0000000340)=""/182, &(0x7f00000004c0)=0xb6) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000640)={"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"}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000040)) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x40, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000a40)={0x0, 0x0, @pic={0x70b, 0x0, 0x8, 0x6, 0x80, 0x7, 0x4, 0x75, 0x1, 0x0, 0x62, 0x2, 0x10000, 0x400, 0x0, 0x9}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000001c0)={0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000b40)={0x26940000, 0x1, {0x0, 0x3, 0x5, 0x3, 0x9}}) 07:21:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000080)=0x7, 0xfc9, 0x1) r3 = semget(0x3, 0x3, 0x5) vmsplice(r2, &(0x7f0000000d00)=[{&(0x7f0000000c80)="6868dd555907ec124bb15bb0d6579291752886c892bf19aad7f9ea916380e22ccccf24818e03f4d8745a", 0x2a}], 0x1, 0x4) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000400)=""/155) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt(0xffffffffffffffff, 0x3, 0x1, &(0x7f0000000340)=""/182, &(0x7f00000004c0)=0xb6) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000640)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000040)) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000140)=0x3) openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x40, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000a40)={0x0, 0x0, @pic={0x70b, 0x0, 0x8, 0x6, 0x80, 0x7, 0x4, 0x75, 0x1, 0x0, 0x62, 0x2, 0x10000, 0x400, 0x0, 0x9}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000001c0)={0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000b40)={0x26940000, 0x1, {0x0, 0x3, 0x5, 0x3, 0x9}}) 07:21:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x10000000000000e5, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) getsockopt(0xffffffffffffffff, 0x0, 0xd0, &(0x7f0000000000)=""/218, &(0x7f0000000100)=0xda) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/if_inet6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 07:21:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = epoll_create1(0x80000) splice(r0, &(0x7f0000000100), r1, &(0x7f0000000140), 0x1, 0x2) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000007c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, &(0x7f00000005c0)}, &(0x7f0000000640), &(0x7f0000000700)=""/82, 0x0, 0xfffffdfd, 0x0, &(0x7f0000000780)}) 07:21:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0xc, 0x6, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r1 = accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000001c0)=0x80, 0x80000) setsockopt$inet6_dccp_int(r1, 0x21, 0x10, &(0x7f0000000200)=0x87, 0x4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x200, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000080)=0x9) 07:21:50 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) 07:21:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x1, {0x6, 0x7, 0x3, 0x100000001, 0x8, 0x20}}) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept(r1, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000140)=0x80) pipe2(&(0x7f0000000180), 0x4000) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x401, 0x111000) syz_open_dev$vcsa(&(0x7f00000005c0)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x40800) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x800, 0x200000) creat(&(0x7f0000000640)='./file0\x00', 0x12) r3 = openat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', 0x200000, 0x90) ioctl$RTC_PIE_OFF(r3, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) kexec_load(0x101, 0x1, &(0x7f0000000540)=[{&(0x7f00000001c0), 0x0, 0x0, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000340)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)=0x6) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x3, 0x0, 0x5, 0x3, 0x0, 0x8, 0x0, 0xf, 0x2000000000000000, 0x2, 0x3, 0x3585, 0xcde9, 0x3, 0x81, 0xffffffff7fffffff, 0x0, 0x0, 0x8, 0x0, 0x1, 0x86a, 0x0, 0x7, 0xfffffffffffffeff, 0xffffffffc76eb886, 0x5, 0x2, 0x5f, 0x2, 0x0, 0x8, 0x1, 0x5be, 0x3, 0x0, 0x0, 0xef, 0x4, @perf_config_ext={0x5}, 0x802, 0x1, 0x9, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7ff, 0x4, 0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000400)={0x1, 0x208}, 0xffffffffffffff47) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x3f}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r4}, 0x8) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)={0x0, 0x81}) readlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/30, 0x1e) 07:21:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xe8) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000100)={{}, {0x1, 0x2}, [{0x2, 0x4, r1}], {0x4, 0x2}, [], {}, {0x20, 0x1}}, 0x2c, 0x3) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$TIOCSTI(r2, 0x5412, 0x1) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000001000000000000000000000010000000000000000"], 0x29) [ 292.885988] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:21:50 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x0, 0x8, 0x80}) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8, 0x109440) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee00]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions='default_permissions'}], [{@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@appraise='appraise'}]}}) [ 292.964562] EXT4-fs (sda1): Cannot specify journal on remount 07:21:50 executing program 2: syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0xc0, 0x4, 0x400000000078}, 0xfffffffffffffcbc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000480)=""/70}, 0x18) [ 293.057144] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:21:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000602) r1 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbc80884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x10b200, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0xfffffffffffffffc, @remote, 0x7}}, [0x8000, 0x1000, 0x2, 0x2, 0x800, 0x20000000000, 0x474, 0x1, 0x200, 0x8, 0x97, 0x6, 0xa9f89ee, 0x6, 0x80]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000300)={r3, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x200, 0x9}, &(0x7f00000003c0)=0x90) mq_timedreceive(0xffffffffffffff9c, &(0x7f0000000040)=""/103, 0x67, 0x3f, &(0x7f00000000c0)={0x0, 0x989680}) r4 = add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="aa27ddf7ee6f9c18fe39baf69f396d5a71351cd33aed3aedb6320a7fc5d51d0ff8177f1493052643cd6984d8a1f87e13890d80b0c5ed34989e7dcbd65bc94048ead7d683fee802e3756fc820a732ed0a8d83411a1a7aab649ecb8f028efe24a6df3c812cf2ee475466a9048a797d6e1fb266", 0x72, 0xfffffffffffffffb) keyctl$read(0xb, r4, &(0x7f0000000540)=""/120, 0x78) r5 = dup2(r0, r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f0000000400)=0xd, 0x4) mq_getsetattr(r1, &(0x7f0000738fc0), &(0x7f0000001140)) 07:21:50 executing program 5: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0xfe6d, 0x1f, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) r2 = geteuid() listxattr(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1000000, &(0x7f0000000440)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@common=@afid={'afid'}}, {@rq={'rq', 0x3d, 0xfffffffffffffffe}}], [{@obj_type={'obj_type', 0x3d, "2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c00"}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>', r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, "2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c00"}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfshat={'smackfshat', 0x3d, '*$vboxnet0vboxnet1'}}, {@smackfsdef={'smackfsdef', 0x3d, "2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c00"}}]}}) getpid() r4 = getpgrp(r1) fcntl$setown(r0, 0x8, r4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000300)={0x7, 0x7, 0x8, 0xffffffff00000000, 0x1, 0x9}) ioctl$VIDIOC_DBG_G_CHIP_INFO(r5, 0xc0c85666, &(0x7f0000000100)={{0x0, @name="c4e2c06892c310fb4b6365facb77b49139763ff119b294b5092b594cd048a8dc"}, "1cf866d38d65013dee09dac0e29c13a88f9af185c885c9a1135dde59f090e2ee", 0x2}) write$cgroup_int(r5, &(0x7f00000000c0)=0x3, 0xfffffffffffffff4) close(r0) 07:21:50 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x0, 0x8, 0x80}) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x8, 0x109440) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee00]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions='default_permissions'}], [{@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@appraise='appraise'}]}}) [ 293.106544] EXT4-fs (sda1): Cannot specify journal on remount 07:21:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x1, {0x6, 0x7, 0x3, 0x100000001, 0x8, 0x20}}) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000580)=[{0x8000}]}) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x2, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x9c, 0xffffffffffffffb4, {"2eade140051a10ee558e9484861a2582b4d919dead2c03a08db20188f2be7f1fc33f91dfd459cab950b7f77b1f747e559990949af01c10b54875bc55dff103655647614b157bc21c1498e005bf750e5d26dec43f14b0a911dcfefc34bd3529970c5f33e2cb0f59920f973b8b1158baf0615a015430bcc896213f84772a1b153c940622"}}, {0x0, "481c843b8746b15d0af5f0c444ac7e1e081a9a3afeb9b8f2b9f9acb4bce3669b97c05999ca4906d5e1b7cb5e618379c1931a6ede64d7c6bef363a7a34d88e44eb32f53e9674aaba5438135"}}, &(0x7f00000002c0)=""/147, 0xe9, 0x93}, 0x20) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e22, @remote}, {0x2, 0x4e24, @broadcast}, 0x11, 0x9, 0x101, 0x1ff, 0xfbd, &(0x7f00000000c0)='team_slave_1\x00', 0x1c860c02, 0x15, 0x3}) write$binfmt_aout(r2, &(0x7f00000005c0)={{0x1cf, 0x2, 0x7fffffff, 0x68, 0x18e, 0x1, 0x10c, 0xff}, "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", [[], [], [], [], [], [], [], [], [], []]}, 0x1a20) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000040)={{0x8, 0x800}, {0x4, 0xffffffff}, 0x5000, 0x4, 0x7}) 07:21:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x105001, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x3c, @remote, 0x4e21, 0x0, 'lc\x00', 0x21, 0x8000, 0x7e}, {@loopback, 0x4e21, 0x4, 0x8, 0x2, 0x9}}, 0x44) r2 = accept$alg(r1, 0x0, 0x0) getsockopt(r0, 0x9, 0x28a, &(0x7f00000001c0)=""/19, &(0x7f0000000200)=0x13) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000001340), 0xfffffffffffffc71}, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES16=r0, @ANYRESDEC=0x0, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESDEC=r2, @ANYRESOCT=r2, @ANYBLOB="d8aba7bdf82c59314d787bfdbfc00962f4c22f27d5df002cbf6b21f69eb40a1cd5567d32c4c39ab85b1d109e6401d9ff45085ee67242225f4bb18965b376df8a1fcef9c97820f0c0f4d69253fa2f5952bbf614856472d1bb3acc94768c525450b8110e029effdd63cb01990e4bfd7a59174fcf5e3f9f1ac3cc054369fcfbe7f607567eb44cad9bc0bac8a2fed0cb1e16c7585eb174d92298804e5a0c7bc7178b8674f77ffcb5e72534a319b7a4c1660c145a820f1549f135eee97061759aff03f04d75295fb6b352ec0272792f806e25e1d754363f65c7f8f01ee1d3", @ANYBLOB="65167d08165d6186c94a47527c3e9db0bd3eeca495dd0f09723e15093506834a79277d273c0f501dd0054c7af58132a601d8230f0cb8c3a30ec387efbbeed9729d17feee8874a528a9085f897612961adeaa3b57ba20ce9d5b9bf830b92dfef35ec7cbd200facf217b4fdb947815177a9941e6d984b8f4948bac4c8a8496c97fd055774f4918e6b5656e30bed00ce5573d88812899578cb338e0", @ANYRES16=r2, @ANYBLOB="c645f3233e326473ad4adeabdb8d9f20aaae5fcc68583201a4d22c996fae4b106238eb"], @ANYRESOCT=r0, @ANYBLOB="fc2752c1d0251829af993792f16d1573713e98b595e7e82431b77c7178740382cb8823933f54f4bb884fab3937500f97cd99826cb49f433fa0950eb0e5aad010c70fc64cc1a1bf92309470638a196b6bef1c0becd44db49072d26262d6fda0bc98eec79f6370a4a0162c5538cdb9b6604ecf11f49ca54d105910a287522d05ebf43e", @ANYBLOB="94baf0667a9cf5207eb8fd33d6f625dade2b5bd845c4400407d5a2e68ef9804fba68f04dbc9888e1a91385f3345b06f35245e8a3d1b11126e20428494a459f2b7493859f2529191375d08f5a7efebf022c9305b3ed5cf2450f55f14466dd4438cf2c242c66666091b02537af9122bb17bfefa377d8ec591927d8362527c8c800060676be50c08ab11916b4f9897aa6118837272c", @ANYRES32=r0]], 0xfffffffffffffd98) recvmmsg(r2, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) 07:21:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000039cb917a1d4bc4da9b587d0000000000000011d794f919e55767186103bcbd0e5612213aeb3528b931f4a1285ba084d7f145af4020aafee819b2843fb17dbd658596b669f0df9f4fa92efcfbeab9c9a8018cc56928b92b4ad144a2dfddef86111bda1904cc45635cb4251af8af9d9427b0b6dbf21a27afba6af4ae04c24260f139f41e2d238c40ab0e482e161a53503b08b95340006a9ef55a574a928463d8d5b7a7c177e7c74a1d045547119e598126f1c96bd7fc704bcce9881955c6923d1085bb7c070500000000000000aa931e33cd4d09bc225753e60566f12a52f8024603f1"], &(0x7f0000000040)=""/174, 0x8, 0xae, 0xfffffffffffffffd}, 0x20) 07:21:50 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@link_local, @local, [], {@ipv4={0x6558, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x86ddffff, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000ea3000)) getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x8, 0x3, 0x9, 0x3, 0x4}, &(0x7f00000001c0)=0x14) [ 293.485399] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 293.578448] EXT4-fs (sda1): Cannot specify journal on remount 07:21:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) recvmmsg(r1, &(0x7f0000001f40)=[{{&(0x7f00000001c0)=@generic, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/78, 0x4e}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000000380)=""/114, 0x72}, {&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f0000000500)=""/234, 0xea}, {&(0x7f0000000600)=""/220, 0xdc}, {&(0x7f0000000700)=""/168, 0xa8}, {&(0x7f0000001880)=""/162, 0xa2}], 0x8, 0x0, 0x0, 0x7ff}, 0xffffffffffff7fff}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000001940)=""/50, 0x32}], 0x2, 0x0, 0x0, 0x8}}, {{&(0x7f00000019c0)=@ax25, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001a40)=""/95, 0x5f}, {&(0x7f0000001ac0)=""/219, 0xdb}, {&(0x7f0000001bc0)=""/166, 0xa6}, {&(0x7f0000001c80)=""/80, 0x50}, {&(0x7f0000001d00)=""/201, 0xc9}], 0x5, &(0x7f0000001e80)=""/189, 0xbd, 0x2}, 0x1}], 0x3, 0x10000, &(0x7f0000002000)={0x77359400}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x800000000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000180)={0x5, 0x40, 0xfa00, {{0xa, 0x4e20}, {0xa, 0x0, 0x0, @dev}}}, 0x48) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x3a, 0x0, 0x11e]}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x28281, 0x8) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x4e23, 0xfffffffffffffffc, @remote, 0x1}, 0x1c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r7, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)=0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000004600)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000004640)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000004740)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000004780)={{{@in=@broadcast, @in6, 0x4e21, 0x3, 0x4e23, 0x401, 0xa, 0x20, 0x80, 0xae, r11, r12}, {0x7, 0x4, 0x7, 0x9, 0x1, 0xe8a0, 0xfff, 0x1ff}, {0x3, 0x8, 0x8, 0xfffffffffffffff7}, 0xfffffffffffff462, 0x6e6bb6, 0x1, 0x0, 0x0, 0x2}, {{@in6=@remote, 0x4d6, 0xff}, 0x2, @in6=@local, 0x0, 0x1, 0x3, 0x6, 0xffff, 0xfffffffffffffffd, 0x1ff}}, 0xe8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002040)='/dev/ptmx\x00', 0x101000, 0x0) kcmp(r8, r10, 0x7, r5, r6) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000002080)={{{@in6=@loopback, @in6=@remote, 0x4e21, 0x21ba, 0x4e23, 0x2, 0xa, 0xa0, 0x20, 0x33, r11, r12}, {0x0, 0xfe6, 0x3, 0x1, 0x8, 0x8, 0x401, 0xd0e}, {0x1, 0x9, 0x4, 0x1}, 0x10001, 0x6e6bb8, 0x2, 0x1, 0x3, 0x2}, {{@in6=@loopback, 0x4d3, 0x7c}, 0x2, @in=@remote, 0x3503, 0x7, 0x0, 0x8, 0x33ee, 0x8, 0x4f}}, 0xe8) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r9, 0x6611) 07:21:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fallocate(r0, 0x73, 0x80, 0xffffffff) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000040)={{0x4, @addr=0xffffffff}, 0x8, 0x6, 0x5}) fcntl$dupfd(r0, 0x40c, 0xffffffffffffffff) 07:21:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xaeed, 0x20000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="580c04001400020028bd7000fddbdf25020008ff", @ANYRES32=r4, @ANYBLOB="0800030000001410140006000800000001000000fbffffff3f00000800000002001a5938ac9acfeae7b5ba20c6080008008c15d6388e28d07ac94883ce581f71de788926de4c040618756009b0a6db0ddef4366fa4b6bdc7ccd7730f82c56a0251b18927c280660d891671a6f19c7bc50912d688c11956b9a752f35294714e92504573403183020ed596ea0b990721df16e40cb4f5375daa150acd4984e3030272455f5f5cb2cc3a34ae5fbda79d8b7b58102f899b53fa267fc9ef4c912dfbdfe454f6488a354e1bf9b7b6f0a20eb6c7af876820ba0468477e40298ce0216aef34c0d4048baa18876f83b8d13a1ebd47"], 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x24048001) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x803}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x18) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000140)={"65716c000000a95b00", @ifru_mtu=0x1}) 07:21:51 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002380)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000002280)='/dev/zero\x00', 0x40, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000022c0), &(0x7f0000002300)=0x4) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000180)={0x2b, 0x6, 0x0, {0x0, 0x6, 0x0, 'net/icmp6\x00'}}, 0x2b) r2 = socket(0x11, 0x6, 0x2) sendmmsg$alg(r2, &(0x7f0000002140)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="45a97621539f1e910e0d5262fa97b7546f9db7968ae8980b86ac1e389b149b90707e60c1482e9ca5827ba511fcb659e887b35f1128178259c9e5564fba8fc5b047964264b1d4797a9523a86cf7a41b7c65e3c55e5b40cdc4a1bc3f49e9616f276fd3370846a4da47430ba50a5ade93f3348660602e62415312e5bcb619bf37ffd5e92746b5c7b233d96aed62fe4ca8afead2eff9b8829ae3acecd3e556c070c137acc5e35046466ba10311f4e7e856b433fefd80c2af41d8ba3cb38beb72e09bdd7ca9f47516418b30b57283e92c0d2c33d8a9221a74a00159c9aeee5a7f36df2f2e5064b171bea9033593bb1970cab79858", 0xf2}, {&(0x7f00000001c0)="1e709a72324ab8843678c0714eb3b55d4179ee76e74f80ce987216f7de1862f9578cd19c1601a1e2d5f0a2b27203ae6da7dedac88b33ef7671923490d1a28228652e1bcd82a3b3edb8d40a0d1c5af82ea7e4f60ecd1a0c9dc9a3f4833529c4dc8b88b17a00d846ef", 0x68}, {&(0x7f0000000240)="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", 0xfc}], 0x3, &(0x7f0000000340)=[@assoc={0x18, 0x117, 0x4, 0x7ff}, @iv={0xd8, 0x117, 0x2, 0xbe, "cd62d2dea779c09a730188bee6bc550e6760727a682eab0666de4869467ad9567548c6da8406a5d7321a07429bd9e21e258114cad2629762dc2bb70c7578d29131255295e3d1f8edc15fa9f3e291bc3729b54b44b1a40e083854a312ce74884e4669921920e77c10f75f3cb9542559621f82ae2db34ca3cb1755ee3a3dc92f2ff0bed0d3672d1d02e478d948413aa7d3869c29644fe0fa8f233187b04558117a73ebd676bf8360ac1bb4b23ca2daa3f654d3fe74647f7678e42857e365c8"}, @iv={0x40, 0x117, 0x2, 0x26, "b7c4de359e19d3a368adbb56e317a02b30b4020dc122b2780da7b9a1178567e72adf32b18665"}, @iv={0x28, 0x117, 0x2, 0xd, "ff87489a9d76b297944564b6ac"}], 0x158, 0x40000}, {0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000004c0)="1a903da4e0abffb4c7b55c4fd4efccb9adc06e44a8cf492c329d226f309cc085e14156d6e30c9cbf7da8e906ad9762475cf929367fae8e14c2322a49af2792e7af39321ede6ec7e5cc8ba00843", 0x4d}, {&(0x7f0000000540)="d269781477e6e08d63eb97ad5ac144dae40e8e82e9803aaa2c0873fe7869aa44bf186a93b03744bb86f02278bcd38df58bbc5a8f607e7fe669d14f52ed77ac52e88be287256771281d50978ea663bc23143569dfa60384e245ec9125b3f588f86fb3ae78c9be491a5fba73c78483203e6f8cc24f4b42466f84b156b4ee392bcb33d8ae774211659398f46a0f04b73c96cf73d00fd3c5f02071e9e30c932919797c567492ae5f5fa4993c1b6e0170023be58ab41b77dd61f0e0d164fa5ce6a7af81f5436517c5a5f9fa5afd133192c649fa074346269b5472d428e505dcb1cf13f3a6033da5b00060c51311c006d9dcca266b08", 0xf3}, {&(0x7f0000000640)="4f723485300856865ad4a485806a079b5765df22080303602be6c0353b56bcf0a77b016573569316175241448009eb182b41110a50dc44f24301b907df4517b6dd1ceda1f7651495b5ac1a0cd12562c315e1c295895cc765493d840ddd776bf6605ee97df98a713720f44cc981ad914b128c1a9a90a4f4287dd73ed846c798b13b5912bef72c1caadd835ef23af00298e51187d99f90f2b8695abcf1a981de6f2f687810ceb2503e5f101c6b9d345eb3c07f43a2709452ec3a94", 0xba}, {&(0x7f0000000700)="eb5231bf0bbf4def5811db14f990b8882880f653dad40829486024beaed638ba229bb5df789d6207b96914aa", 0x2c}, {&(0x7f0000000740)="bb4553e8be06ebe2d09ea6f33736fb1e8636ef2b154defd2129908a176527cbd004e7ae1663e090aa570", 0x2a}, {&(0x7f0000000780)="7565e12a6015064f1e1b3c71ddf3d019d9a62f7ae426051dda1824d4a3f2549cf894981b641688d7a8eafa11fd74a63a9ffae33d5ff4a5cb9f4f18eaa78ca77c65e54c2bb0932aa9e16d629dccf0ef591ca7fc22555e4b84c449812a534cb6110402db4c6a2dcbf53e948e98080e9f6c3cf0a96cf7ffdd6cc1493436b300aa9f693fb8829b6e827e4fe3d72b8c089e0a51e59e78cee94f984db8109e74160d617345864b4438e295066cd5c82489dbe4aa479adff6aa9b4b1ec6321573db321a83855308d46bc666d78c2bbd17828bf0f18784", 0xd3}, {&(0x7f0000000880)="0049776d07710c70a6aa79da453a8e0b43082ff0ceee63c8c06db38d6fb034954ecfae8a0b4113090bdd5cdc30d9772bdbd246", 0x33}], 0x7, &(0x7f0000000940)=[@iv={0x20, 0x117, 0x2, 0x6, "01556ba84741"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x88, 0x117, 0x2, 0x6f, "b91a13e0ea76a17f7a78f103fe29b055c2688f9e98d6c11416e89cbcfcba17d65170600b03f869194318ff248021402ee77b21eb66b7334bea8f88047666a02d1cd51a51e353de4606c78529bdd7bd6a6309534883e43782590d0649e46bdcfb51a02644d0ee83adddf95a6241994b"}], 0xc0, 0x4000000}, {0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000a00)="5e846340e56c33f3f252dc8e5fc316e4c449ae82cab29a10ac3601ae3dc733dc8f4b6fb0a0fc79bd4c06b323838e6278a7e5f55dddbd5f311eb9b57876bf440b6c51d7edb12bbcafd0ece6ade230068e6d6268c2873bbac24ad0b6c7e5777a9842cbc24cd1616241500254591bba5b0265555a8ffc796352ef1d046d156559596e7fb6a74f39b6662615b4d88e25cae2f705349dab81d2b9b719208f3e9c2fc9893d8163d4d39cd0a48cf963ae25cec5ed2a64d76fce95c3b94da3ed1e0b52724b8082210acaf17f92025ce00215c7cd399a09aac57553597046f57c4acbc779e463e0df", 0xe4}, {&(0x7f0000000b00)="ca12065b9deb64e7fbbf5a02f7015ae2e08335f19b098130e229797d49724de826f2c61b3c06a1c1720e0766d0a3823924e34c6e838b8118742f480ef703f406e6c6bd3a0489893161a8858a033f3805885cb943a3cdef85625513a73f921471", 0x60}, {&(0x7f0000000b80)="22f531f85ab38deaa0bac4ddb8c44edb3ecc4b5bfeefde05af21d226b0d1cfac43fc4d30bcb37ad8d12f219a86ec1c35ad9cf4fbb0059eb17320c211ed3f8409a189c01d3ac41fd55742d20c5139f117073c5c3e23fee3407ca1a41d8d43606293fad5792b3b0c926c7132c2376590114086d35e5a6313bdd8eee3b0e29ece96aa801ef7837d4e1ec6928f10cc48869357c7894a57ed893ae482c31518c2138a5ad566c06c47f35c55e3ddd3aeb68c7a96fa36c125fc11a7f7bef3bb72", 0xbd}, {&(0x7f0000000c40)="96fc9f02eb4a264179a2c9948e170d6de707a2bed40d5c9e906a460a226640b866c067de5f5f7af6ce37b4dbb2714acf1083876ec1b4bab58cd3e8ab1500dafde08774bb73333f4f6d0a802b5fba15327798060fddb937f02b8527f8d1ab162a6a9d8f623fc3398c887ad36d365c07d15a81c3810d4bfeea89712b9b57d3f3cf58302a577358ea930f51dd22420bf83a8118490528a615f7c2086e8fbb2126d8c4e96c63cd90614c0304dc5fe0d7131629787250116d06cfde3ed394048768e56b5b402e61c0b96d4dd5674603d2bcd303bfe57750f1fc04c515cc4676f35e3a6be5ed542d4ef3bdd78f0496cfcfdc331a987296", 0xf4}, {&(0x7f0000000d40)="74bf29b77aa4534385dd441f04871326767f668d897f2b06d5e2b407f17437caa863836cba1320196a4eea1d6a8c0ea8664956df9a6393ac3634b18b2e5844c25bd6783515a5c477a56cfce86f69800fbcad8d2eca8b9836cb98e909a49e9dacbd98e05769515181316e7e39c881ecc19dc1cf08611cb4f785aef51ea8d66f0c47848c6fda54fc1a42d5e40af5e2b5d089edc9aa3023b48c36732520afb9c96b92d3a1654e821ec91a2fb310a4b8b691b6b287e6275309fd64a410456b53ab96116dd62b8d30af84571277a92e038c46d8fe00d9598020bc15815f56f13300712d8e0fe6558687db5e5dc4dd1f3c70c6534798221e80680a6577c8241152108f705e7cad91d92f316f2def119dd19688f1e6f1eceedf3465830cb0a37a689bd0ff6462166f284dc1b05500ab8a6fc255903bf29438039ab47031d834745815488ce90c6bf85c761e060c9a71f8754ba0183fb44be4cb323f0e9fa3be0d6c7b28067ba149a183bc8dccc738ebf5eec5df255f6274e5805fbf6839113d0ed6de8a510708d92bc75d6c5e4515d47e075166db7f3967224b9ecb2ac65d52ccaa9d6b5d5dd674bf31fdb16cbee7e194e2f918d99c54ccc409985040b336c2ed5eefa6bd3cda80b7d26a3467013472852f8d381e8b414461e93881dfd8d6f8b6790276cf4a2a9b302c73f01546abb6ca491e94807e6b3229607ec15d76a6c906c65268895cb627dd40a640cf4fe42cf1a1b35c93753bdb8d69ec455be8a03f230ad8666730ba86f075481ad0df4cde053a21091dd4cca91941e421c5703b77fc7c6cc71aa608380a2b62d520561f2c61c34bd2201ceda23ac839a9389f7e31fbeefac06041f62fef370eb81c53bfa7452093f1a76d082ac8cc8a916f80cf29602cb86e42a9cb1d88069ac90d52567cc91d7e45d3a7e7a23cbe7493a10fd0442cc2caac3c53b44e0de7c3443827aecdbc4cb95a19ea8ba1ff5868c94a56c88b80328fb6b1b9f4be1e168acabfbfecff44d91f8d688c443b9c6ccaefe25d1fdc49f43cd4bcabfa1c985e037a57c3e3cbdb6c4a8b6499f45bbfe4b9aa633a675a7093b4b06721e3bab4472a99f110874b82bc58091b1143dd7be73d0ae4df954f809d38c4ca69a0c80c3ded4458d391ce43af51b0656709140711315d9b30363d1205ab4e972cbb212fa11d437e8a4d5bb46d43c00fb3c826b87336c74ce97a307e7152bc309cca7f7b69faa9d728b11b029277eca6522ee40f249c92c4cdf73910e1f193550a837852168e3be76f2c5a99238149aa353d032022bb0afae586cbd4de660b2ee013dfffb3dd7b9f3c81c9ba7862e2ebf19f991a4026d2e4dbe5bc3a3774c0d5ba332d25bce534918242bd794511b415132eda3f7dd5f303d1fcfbd52364719570667003f9d92835f8319de49a5b1754f6131c6737292e41b416af7578d8a7e93a0db38cbd9526694b1cfb3d6aac8e4dbbeea8c44c986a4c27d374a972631545f591fbb0e61ba40b18521a7f0dd657500cad01b244becc1c2ecb4848452621fa8f033a417b0146a446e7008730992ccd035fe482ae637bba2454542106d5cc1cc5dba6665fb3051730156cd232cee5316c7857e868af55917768d526daf8df1d61d81e59573f6d7210abfd7432ea0e6822b49dba373754ac22e728d605eb9cf0b26e482f82f7dc611a12e88e1fb186281c834ea8385d161b1d6d7cb7b438c224e1208fd029f84225a3832bddcd291c2ddee5fbf9af4e54b561aca2e932b4545ee131b7e0d946e3455a4dc518546937197d12a32f778d7a38053c5e60ae46986b094420032a7b6255ef82d2fc2fd2f19275db0c0bf486df7c31d69d2dcc205e4841790dbe4e17572a3926184ec8ffcba28a302d677ad5fe012bf59b0fbbe293024b28465fb6bf159000faa7b493d18abaefeac21efa2665810ba157943ce1014eb0bd132bac48548c416fd6107a0ff0de60a3568ea36998e5ac8095090af7994ed1358495d6ac07292346ac85778b5d462775e02f8bb5da9da84ebe031f80813b2343e33fd87bb5defa7d9b961ac5fa50b9d827bc654a44c5db4b905ae1dce222f29bffb7a2e1353fcd396f0e2fa1df1452c530b46dbbbc0f1ddd940cce607f27b157371288eb35c4e2bb45c66b7b5e899ce551da9ce341c9cc2621a47e5f98172c5d12560cf32cb7b9cff6d6c29032890aa25e612afd5f3e3bacbc0a71efa7acc5a201c9f1291762bfee50e33f813672761bb88a93411a292635fb3cb23a953b08fa342740a30af633c8d9366ad336891668907d89e400caa6af701f8d3bbbc5c7a3777fb4208fb09e07dfc140ca2ebc3d598160c317947b60b61948738f55e66f5b533ca94874b138c6ffa3e06247a6fcd3e7c954a2c936f46b8ef2ab9986ed4961b65c31d2592185a8d6ef9d4c4d849a08c592a25335da334e9fa26be7e2c02b5f3f866f6b6174db481dc228c60d4e9a49846767f773ada8a25f4a070ebe40ed701f87f3db2dcdbb1a51c6f6dcc8a1db4f116e49dd9757ab0b924ab1076c10f8e414d4d278445cdbb4b441550488b49a7a054ab4220e4a243687ab0e85b413aa997387596c2303c2668989338d1d8691c19cb01745df780e61d8829793df17a32efc92d176877576ec4d50a5e953124eab2aabb4badc10339129887c023e3fcd376bbbf9ec3af04c79ab9ff17fcd30a1d4af6b05949dc0873b35ace29e126f364a17d0771b41cea17804e2483f32e0179dc2ce12a84a9fa6d3d6bb85736592cf42339d886933c9309c2021c4365375d70b7fb182965464c2dc3d12d09e9afe42ae3372daf7df764a095e19b25cc5426382ede2ef07510ef5715228bac215df831fdf5a146f2097f35427d7d56555e5b5cea0ab3ccd79d61b791d71477818ece4bf8ee9e9febc91d447a1ac0fab5725e91fa07a1e163e20a76b0e951d37277a509a32a72ce962db839445b64ded9a07d9db4ee143157c40e1567257eab3b5ceddc9d3249c4c09c234532843fef51d7bfcf40898751340539b9890ccb03e017f6f6002369fe17296e02a67ec19af8c48e22c9896b8592b769c08831c8f992b92d2a29da0951df65caed71e742d1810898befd5ab12924468039db5b61cdd7b3bdb4bc502721d9f7d68800a408ebbfc7bfa5fc0bc828934d979a1bbae5c7ffc1b184e8b34d11147f26ba19e7edcff5bd858c40ff7896f733f2d6352d2a80742349db6bf972b63b889d4f414328b016912b26ae833fddea515028146d3705b529e476c2ad27d95eefe7ff168babd94fcb2f4aa51313d1fd9efdf73e90d93f16c838528a510e6808b1968c52e375c2b85c2c4d401999fa0960a7de2df4cc40c2e8878f96241bc71e2385b331c6934b354901eef381d0234a3b5cdc69dd94b6a06156011c9da10ba6f1b0850d9e6d138f39cfa75abb759ad2b96cc67d57671cec237e255b4f102db5deddc2592b7aaac20bd546e53b4e6759604be875ab6080d30b3b88781a7229a07bb5451ee5ba06ff0c9e605f67abd4e2ed20f91088643ccfbcab2661abaa9bd7981522540ad2d2aaf9defc8ba91c86fd2ce2ea04e801cef6f91226f948713cb3d14b831459a11dbe859d25f85d23f75035f5daab09aa5f0943854e508719d30a8d6b223a30a09c4d12aaac71dac69d1fab1dbbc04395958933f61281c2b291c9623f83e8c9c695833cf05720b9518378e808bbbeee9f9720a09e1a32f1608c0378a5ea5bab4b119f2e45619a49f0e3647feb279a463e14c9f394fadd9221cbec578fc6e73ad85a290f035018be8f14edb178716e6f71df9b243362d1cd8a1bb88ae2b121d23640cd59c123036f8067f1c3e434f7d7c6b5f7bfe862893ef00f037cb58e6ca59ac26892da8c01ff7ba62eea354e51e9e99a2ef602ae93b965b2fe40efd767d2236cf15ddf64afcd313d4331689d642cf4758bd823f8c6850afbecb81a64c157b992d79fa80f81ba719583341b26ee761788c16c3a49762f7f0dff26be067eb3e56a26b8f9715a28bfad10a21776dd1008906dfea7935fbeebeb0c46653793ae038b430eb037020a69b9c5cc3864a1135a3ac8dd186c50a36f9d1c063759fed79eb6284bc74cad62cf5aed63a0ca4782b1004b8395080eb2135fd34c7f01b3362f8ddff94e4a1de1641f5ada5ece67c069ef1261519db1272687d6844ddb64d4222a3bb761838c6bb7937c506910b5ee22f92944d957471f369e8b777725fb8b230bff099edbe459623a4a50491f5bf15c4b33cea3e719b30b22a7df6f32ecbf0d68d3fe9d5d6a1954386c6b176d3edeff0f806f833ab3bffae70c1103c1c8eed7b671611f192414fc645c38a0801031d89cae13181029f3d4121138793a0c988d16856fdc89b121f451eb201fde9ee2e0b516c1df6b2cf4b4874525c46b81afe2a39a3cfb234c7c35e917ff206a1fa57d0a745535b98f73371d8b115f4cce523108c0660300b974aabfc301e0e253a92697f9bd9a27c3b735d9d85885db0af82efe12e63006d2d55f32fae0f83f4548cbb8c1c60bc01cd0833d718a6e47982e55fd2c12c8824702aa9f7fdf3ffcb9f47b42dac9d1a484fcf7cb0c224ac4bbf10fc2176eb663a148029b1e769f117c399fecff94046c7e16154e91da27305a345b854a371ebca598d7f8e41050cd925e8e989d17516f2af4250cc35f1c493f651fbc69518296aa3427fcbaf045fb998f94df7659c398582423ffd111b70d25baf4312f78af2a1f9599f2fc4686cb23f632ac0c981e604316d4e2a2daf787b0b24fe212f6367f385e31f7c8adc3389876257e7bbe35c1b8476822912263f1b1d938549a2c64b763f118ca51a6383dc2d5db0274fabf8920287299e681185fa649034d50f32ee4408354567befdf52fb03989cfcba799fb5cec05b7950189bed58d41ec7720d1dca768a4909b9ef1f6af2692eda347f1925b6afb6a5b7393ec458aaa38ea2067f074447e52ebcec82576d014b45ac66c525b497d5e78d785257abb77fe64dee125dd2256028f0988ef0b4236de6abd4cfe3cc20ae8d21ebb5a1c488ca500e9aeddae287a16d3c6fd237525e390132b8d9a5e0d2b36432264176bc8b93d90535b7f1ba6e6e502a31130e71f637ffd36fc8ed2ab841d26b89637a215f069a99e58889a75f414dca382656afc1d0419630ea3f33454e18cc6f8c17603c96df9ad769d6a4bbc46b31a274239a65e677b24c8eab48132a02cae044c64fec6072418460ab248a6dba066fa732870e2a1f206e4be9051a998c305b5102edb722c9e7edb60bfba7d85a99ca28315a535863fd3b8c810194155a58f6ad619c0b2984dd45288dc07662c886999cd7faf0a45118c9da264d1e104da497e78a866b143175b3499a74f792b6dfccbd9b23547935e20dfae2d11fa6ea874830bd56b14f70af2e2bd28e5ba08dbd2ea5ba2d07638431a32fdad2ad93c3a7f11bc3371475a7b7a65a21b87be12a0343927b06a98b27dd61a3ce06f90038776a8b4759f7407f1e900561b5239c5233291bb208c9fc1dfc09107caeb412906a03778b766c2b21d42cdb1e572ff03e6eb8091bac3fa2e0a3232f8dfa948cd6224ed82f27db955f16ec6c14454b1f708996043b08fbe8f880b1d78770073d48b19e10598269111045afa6aa1b0cd3474f78e3d7285c22e0ffa9960d642e48fabe9b8bf179befd74c8b4af8d99cbe5bb9296c9834cae702434667551006a6cf3d0d63fe5db484197800d1a5d8a939a001d0782fb131357deab0569086ad070f2df7baa066f322bfb42ffd8717d1a1950d996a32316758b83e", 0x1000}, {&(0x7f0000001d40)="272450157b6fbf30e54d096059aa0ba7422c7cc40a03a4888d4826a121e7cdc1ec99e637e92559b3e32768fc905ffcf85f36711f0d1065b3f6ab7edec4", 0x3d}], 0x6, 0x0, 0x0, 0x4004}, {0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000001e00)="04ac319fab8e9e3f30440114ef03c3ad9e9bf6d6deabdd2bbf10a942264b02eb5a74008b8266b24d9fc68e4b707354d4a255fdb68beefc996dc871d7af9ed10259a0f8682ee093b7ee6b1550780d7f4b01b52bab7513fded9ef5925afb6cb805413cf3bbdb869803ab928997aad22bf16675026bfb1576fe790b3deb0abe76d097fad10b1a8a50199eb7e2473537818c6e3f5677205dbe62f68242fca5b7e1a60a245dd4fbc610164b0332b1ac", 0xad}], 0x1, &(0x7f0000001f00)=[@assoc={0x18, 0x117, 0x4, 0x7fffffff}, @assoc={0x18, 0x117, 0x4, 0x10000}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0xc}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x800}, @op={0x18, 0x117, 0x3, 0x1}], 0xa8, 0x4}, {0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001fc0)="ee3f8c3efd5581741066c45433b5ff0be92bbbc71d700e290959a51a94901b3b1f0ba389d1a6fc1023d32e16decf392f7e7ae574b9dd8c4c6a0a803c9401c0f71fe5f57250434df8b37e224a", 0x4c}, {&(0x7f0000002040)="b356f2267e629ca392bc2fca16c11828c974175ceea08c4418eba68e950a4159f28ff962d829c0e85da22f951cf0af8636b1c36849ee42c5e35f9ef978457bfe73c83c6bfeee0d7e78adf45febbb97551e6e20caf4d9c2d6ba522b0345856a02265f568a5a163703c81a118b6d60163d19b300", 0x73}], 0x2, &(0x7f0000002100)=[@assoc={0x18, 0x117, 0x4, 0x6}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x30, 0x40}], 0x5, 0x40080) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:21:51 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@link_local, @local, [], {@ipv4={0x6558, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x86ddffff, @broadcast}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000ea3000)) getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x8, 0x3, 0x9, 0x3, 0x4}, &(0x7f00000001c0)=0x14) 07:21:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x1, {0x6, 0x7, 0x3, 0x100000001, 0x8, 0x20}}) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x6, 0x101, 0x5, 0x0, 0x3, 0x2, 0xca55, {0x0, @in={{0x2, 0x1, @loopback}}, 0x6, 0x1, 0x4, 0x9}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0xbe, "1929843d086805587a8982624fce33cdd6a1ecc1dedf90e08f9d000d3e1ccf0310432bc99584772e0de1a019c76736cdbb10713ce12b489027f76b20365e9afcd420f629fa8a669295c7a5c04abba07d8cc46b9192120b9f297c4bb23b0a7f830e7b5d03feff3f12a4cfbcbadea947903ddeed442026693bdb8adbbe07bbfdedd3bedea1a62f23c0e8928a8d6277634c314dd64191cc4822d5066747ccc43db6b0fc05b9bb843e70514e5cc6cfb08aa12ab5cf62d954b624d0aa58dc51ef"}, &(0x7f00000002c0)=0xc6) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000012c0)=""/160, &(0x7f0000001380)=0xa0) syslog(0x3, &(0x7f0000000000)=""/112, 0x2e0) [ 293.927766] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 293.945325] EXT4-fs (sda1): Cannot specify journal on remount 07:21:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x80, 0x7, 0xff}, 0x10) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) fadvise64(r0, 0x0, 0x6, 0x5) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0x3, 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) dup2(r2, r0) 07:21:51 executing program 5: chmod(&(0x7f0000000000)='./file0\x00', 0x10) creat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) 07:21:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x1, {0x6, 0x7, 0x3, 0x100000001, 0x8, 0x20}}) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:51 executing program 2: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x200402, 0x103) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r1 = epoll_create1(0x80000) unshare(0x8020000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000200)=0x80000000008001) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/mnt\x00') ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, &(0x7f0000000340)}) setns(r2, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) r3 = dup2(r0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000680)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./bus\x00', 0x6, 0x2) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0xffffffffffffb917, 0x15, 0x5, 0x10, 0xa, 0x1, 0x3, 0xee, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in=@broadcast}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xffffffff, 0x9, 0x5, 0xc385, 0x0, 0x8, 0x0, 0x0, 0x82, 0x7, 0x5d, 0xfffffffffffffffe, 0x2, 0x1, 0x6, 0x9, 0x1f, 0x9, 0x0, 0x6, 0x0, 0x6, 0x8a, 0x3, 0x0, 0x5, 0xc00000000000000, 0x3dc, 0x0, 0x8000, 0x101, 0x0, 0x1, 0x8, 0x6, 0x80000001, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0xe6}, 0x4, 0x3, 0x1ff, 0x0, 0x5, 0x4, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x9) fremovexattr(r4, &(0x7f0000000080)=@known='system.sockprotoname\x00') 07:21:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000040)) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x10040) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f00000000c0)={0x8, 0x0, &(0x7f0000000200)="f4526e04a703f071c54f48be3cc59e332dc3bb497359e20dd9ee1cf993c79b47b29941a1c81b960e456975af1b599a5189c15cea041f5cbd1c3756495b13505413f685aed0c0033e43577727663c2bd6b627855e48f397a83da152182bcc53ffb4cd9f8c75b49d184fbc8295da6f0f47445d8c6903a655dccf6598e3e78225d55d326816b84cf734d9fbab09ebd07b190930fc92f0f7c90840308414bf022383ee14a4f2b58c0cf0e8babdaf1831f0667fee0acb9cee9a42499ad841f363e9eebdad015b1cbc2cdc1d7be9f04aecbfb0d676fd6e71fe779fbd4c1d77205ba3c8a8d868332e9661f9", {0x10000, 0x7, 0x757b5753, 0xf, 0x9, 0x1, 0x7, 0x5}}) [ 294.115525] kvm [7561]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 [ 294.204916] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 294.213622] EXT4-fs (sda1): Cannot specify journal on remount 07:21:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000500)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000007c0)=0x80, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x40000003, 0x0, &(0x7f0000000c80)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e21, 0x8, @remote}}, [0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x8765]}, &(0x7f0000000a00)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000a40)={r2, 0xfffffffffffffffe, 0x4000007}, 0x8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000003c0)=0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000d80)={0x0, @loopback, @rand_addr}, &(0x7f0000000dc0)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000001400)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000c030}, 0xc, &(0x7f00000013c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="bd94c14124fca86895add6bac7cf3d0caf0343660002010000000000c979d74e881f"], 0x1}, 0x1, 0x0, 0x0, 0x8040}, 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040), 0x4) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000700)) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x2000, 0x1000, 0x0, 0x9, 0x8001}) accept$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) truncate(&(0x7f0000000400)='./bus\x00', 0x16c) r4 = getpid() mq_notify(r3, &(0x7f0000000540)={0x0, 0x3d, 0x4, @tid=r4}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x2007fff) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000440)={0x30d, 0x3ff}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000480)={0x5, 0x2, 0xbfd, 0x401, r2}, &(0x7f00000004c0)=0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000300)={0x7, 0x7, 0x80}) sendfile(r1, r3, &(0x7f0000d83ff8), 0x87ff7) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x10001, 0x82400) 07:21:52 executing program 1: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x4, 0x4, 0x7}, 0x2c) r1 = memfd_create(&(0x7f0000000140)=')\x00', 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000001580)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000280)={@loopback, 0x2c, r3}) setsockopt$inet6_int(r2, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0xf4, 0x15, 0x8]}, 0x75, r4}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r4}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x3ffd, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) sendto$inet6(r6, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000180)={0x78e0, 0x8, 0xffffffffffffff7a, 0x1000}, 0x8) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f000089b000)}, 0x1ec) r7 = socket(0xfffffffffffffffe, 0x10000000000806, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x20, 0x40000000000004, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r8, &(0x7f0000000000), &(0x7f00000002c0)=""/206}, 0x7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0xe7d, @mcast2}}, [0x94, 0x200, 0x10001, 0x6, 0x0, 0x1ff, 0x6, 0xbe, 0x8, 0x7baf0171, 0xfffffffffffffff8, 0x20, 0x8, 0x7f, 0x6]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r9, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x20, 0x9}, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:52 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f0000000480)=ANY=[]}}, 0x0) setsockopt(r0, 0x65, 0x5, &(0x7f0000000000), 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000080)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "2654b09c99a723e44390a93e355f1a0f40d6371722dbb06567155029d3477ebf58a12e4f09a67d1c3cd6415bdc50c20d98762bc5023e9cb4cbfe3ff985c2223b"}, 0x48}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) 07:21:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000700)='/dev/vcsa#\x00', 0xe793, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000007c0)=[@textreal={0x8, &(0x7f0000000780)="660f01dabaa100ecf2ab0f01c80f00916a9abaa000ed0f01caba4100ecbaf80c66b8b6a39c8966efbafc0cedba2100ed", 0x30}], 0x1, 0x0, &(0x7f0000000800), 0x0) 07:21:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:52 executing program 2: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x200402, 0x103) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r1 = epoll_create1(0x80000) unshare(0x8020000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000200)=0x80000000008001) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/mnt\x00') ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, &(0x7f0000000340)}) setns(r2, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000000c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) r3 = dup2(r0, 0xffffffffffffffff) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000680)) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./bus\x00', 0x6, 0x2) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0xffffffffffffb917, 0x15, 0x5, 0x10, 0xa, 0x1, 0x3, 0xee, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@local, @in=@broadcast}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) r4 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xffffffff, 0x9, 0x5, 0xc385, 0x0, 0x8, 0x0, 0x0, 0x82, 0x7, 0x5d, 0xfffffffffffffffe, 0x2, 0x1, 0x6, 0x9, 0x1f, 0x9, 0x0, 0x6, 0x0, 0x6, 0x8a, 0x3, 0x0, 0x5, 0xc00000000000000, 0x3dc, 0x0, 0x8000, 0x101, 0x0, 0x1, 0x8, 0x6, 0x80000001, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0xe6}, 0x4, 0x3, 0x1ff, 0x0, 0x5, 0x4, 0x6}, 0x0, 0x3, 0xffffffffffffffff, 0x9) fremovexattr(r4, &(0x7f0000000080)=@known='system.sockprotoname\x00') [ 294.786951] kvm [7561]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 [ 294.912438] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:21:52 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f0000000480)=ANY=[]}}, 0x0) setsockopt(r0, 0x65, 0x5, &(0x7f0000000000), 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f00000001c0)={&(0x7f0000000080)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "2654b09c99a723e44390a93e355f1a0f40d6371722dbb06567155029d3477ebf58a12e4f09a67d1c3cd6415bdc50c20d98762bc5023e9cb4cbfe3ff985c2223b"}, 0x48}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) 07:21:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000000000000d000000000000000000000000dab3cfab95be6295a449f18d840e7866d0261095f6fee937e0dd213aa24669fb4df9c6c5d421921652bcf847961f4a9ec6144f231dcaa81b4eff5c34d0bda147a0260994b6608d6413d76c052fbf6bd6d454376d7117609b309a3a6c60e045e470aa9fadb8", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c00010069703667726500001800020014000301"], 0x48}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x48602, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x800) splice(r1, &(0x7f0000000140), r0, &(0x7f00000001c0)=0x49, 0x0, 0x3) truncate(&(0x7f0000000180)='./file0\x00', 0x0) 07:21:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x96) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) 07:21:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000200)=0x37, 0x80800) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000040)=""/42) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r3, &(0x7f0000000080), 0x50000000000443) 07:21:52 executing program 1: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x4, 0x4, 0x7}, 0x2c) r1 = memfd_create(&(0x7f0000000140)=')\x00', 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000001580)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000280)={@loopback, 0x2c, r3}) setsockopt$inet6_int(r2, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0xf4, 0x15, 0x8]}, 0x75, r4}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r4}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x3ffd, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) sendto$inet6(r6, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000180)={0x78e0, 0x8, 0xffffffffffffff7a, 0x1000}, 0x8) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f000089b000)}, 0x1ec) r7 = socket(0xfffffffffffffffe, 0x10000000000806, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x20, 0x40000000000004, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r8, &(0x7f0000000000), &(0x7f00000002c0)=""/206}, 0x7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0xe7d, @mcast2}}, [0x94, 0x200, 0x10001, 0x6, 0x0, 0x1ff, 0x6, 0xbe, 0x8, 0x7baf0171, 0xfffffffffffffff8, 0x20, 0x8, 0x7f, 0x6]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r9, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x20, 0x9}, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:52 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(r0) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000500)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000007c0)=0x80, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x40000003, 0x0, &(0x7f0000000c80)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e21, 0x8, @remote}}, [0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x8765]}, &(0x7f0000000a00)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000a40)={r2, 0xfffffffffffffffe, 0x4000007}, 0x8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000003c0)=0x10) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000d80)={0x0, @loopback, @rand_addr}, &(0x7f0000000dc0)=0xc) sendmsg$nl_route_sched(r1, &(0x7f0000001400)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000c030}, 0xc, &(0x7f00000013c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="bd94c14124fca86895add6bac7cf3d0caf0343660002010000000000c979d74e881f"], 0x1}, 0x1, 0x0, 0x0, 0x8040}, 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000040), 0x4) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000700)) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x2000, 0x1000, 0x0, 0x9, 0x8001}) accept$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) truncate(&(0x7f0000000400)='./bus\x00', 0x16c) r4 = getpid() mq_notify(r3, &(0x7f0000000540)={0x0, 0x3d, 0x4, @tid=r4}) openat(0xffffffffffffffff, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x2007fff) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000440)={0x30d, 0x3ff}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000480)={0x5, 0x2, 0xbfd, 0x401, r2}, &(0x7f00000004c0)=0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000300)={0x7, 0x7, 0x80}) sendfile(r1, r3, &(0x7f0000d83ff8), 0x87ff7) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x10001, 0x82400) 07:21:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0), 0x96) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) 07:21:53 executing program 0: mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x4, 0x4, 0x7}, 0x2c) r1 = memfd_create(&(0x7f0000000140)=')\x00', 0x3) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000001580)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000280)={@loopback, 0x2c, r3}) setsockopt$inet6_int(r2, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x3ac, 0x3ef, 0x5, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0xf4, 0x15, 0x8]}, 0x75, r4}) socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r4}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x3ffd, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f0000ffa000/0x3000)=nil) sendto$inet6(r6, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000180)={0x78e0, 0x8, 0xffffffffffffff7a, 0x1000}, 0x8) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f000089b000)}, 0x1ec) r7 = socket(0xfffffffffffffffe, 0x10000000000806, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x20, 0x40000000000004, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r8, &(0x7f0000000000), &(0x7f00000002c0)=""/206}, 0x7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r7, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0xe7d, @mcast2}}, [0x94, 0x200, 0x10001, 0x6, 0x0, 0x1ff, 0x6, 0xbe, 0x8, 0x7baf0171, 0xfffffffffffffff8, 0x20, 0x8, 0x7f, 0x6]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r9, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x20, 0x9}, 0x8) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 2: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r0, &(0x7f0000000140)=@nl=@kern={0x10, 0x0, 0x0, 0x40}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)={0x0, @speck128, 0x3, "3e3c3fd05f106cf7"}) writev(r2, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) 07:21:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000340)={{0x0, 0x0, 0x1ff, 0x1, 0x8000}, 0x0, 0x867, 0xfff}) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) creat(&(0x7f0000000080)='./file0\x00', 0x6) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getgid() r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000040)={0x5, 0x6, 0x3, 0x1, 0x8, 0xd9e, 0xffffffff, 0xbd, 0x1298a363, 0x3e}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0xa80, 0x4) sendfile(r1, r3, &(0x7f0000000180), 0x100000001) 07:21:53 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}}) mremap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x11000, 0x3, &(0x7f0000fef000/0x11000)=nil) close(r0) 07:21:53 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x410080, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000180)={0x4, 0x10000, 0x4da, 0xe2, 0x658, 0x8}) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r3}], 0x1, 0xfffffffffffffbff) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x35) dup3(r0, r3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) tkill(r2, 0x1000000000016) r5 = getgid() getgroups(0x9, &(0x7f0000000040)=[0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) setgroups(0x2, &(0x7f0000000080)=[r5, r6]) 07:21:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000280)={0x5, &(0x7f0000000240)=[{0x7fffffff, 0x8, 0x3f, 0x6}, {0x37c, 0x4, 0x5, 0x804}, {0x3, 0x7, 0x3, 0xef6}, {0x81, 0x51b5, 0x6, 0x10001}, {0x0, 0x8, 0x3, 0x4}]}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x5, 0x200080) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000380)={0x6, 0x5, 0x1, @broadcast, 'erspan0\x00'}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x8000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000100)=0x1f, 0x4) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1000, &(0x7f000040e000/0x1000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f0000000000)={0x0, 0x110000}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000002c0)=0x20, 0x4) socket$packet(0x11, 0x0, 0x300) write(0xffffffffffffffff, &(0x7f0000fa8000), 0x0) syncfs(r0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000300)) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000003c0)=""/152) fcntl$getown(r5, 0x9) 07:21:53 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000700)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYBLOB="bfacdef745940e0d8c00678fb4025cb333d2f48afaa8a89f8e4fc4e0f03be16e070001ec198bc51a879520", @ANYPTR], @ANYRES64, @ANYPTR64=&(0x7f00000006c0)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[], @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRES16], @ANYRES16, @ANYPTR, @ANYRES64]]) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x4001, 0x0, 0x0, 0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000200)=0xe8) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchdir(r3) write$FUSE_DIRENT(r3, &(0x7f0000000540)=ANY=[], 0x0) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [{0x2, 0x0, r4}, {0x2, 0x3, r2}, {0x2, 0x7, r4}, {0x2, 0x2, r4}, {0x2, 0x3, r4}, {0x2, 0x5, r2}, {0x2, 0x0, r4}], {0x4, 0x5}, [{0x8, 0x6, r5}, {0x8, 0x6, r6}, {0x8, 0x4, r5}, {0x8, 0x0, r5}, {0x8, 0x4, r5}, {0x8, 0x2, r5}], {0x10, 0x4}, {0x20, 0x4}}, 0x8c, 0x2) syz_mount_image$bfs(&(0x7f0000000680)='bfs\x00', &(0x7f0000000740)='./file0/../file0\x00', 0x9, 0x3, &(0x7f00000008c0)=[{&(0x7f0000000780)="0ac71aea8a42c422021653587f37fbbd4a0e4829890733184d085201e887dae10fd15a76e227ee46eb12590df33d49fc552830e87924079220c94c52b3011614033727990933b367054f1e642c21200272fb1f773d72df46c6d9cd82d506e4c515d2627a31b21e2e09e02dce28a00dc1fe2a7bfc39d1052797d8b693", 0x7c, 0x60}, {&(0x7f0000000800)="313b35585f12a39ede5d598fa648c74d63e6c3609f33638651572ad2763e5b5b3fc1d5f6320263a53bc8d28f18e60b445b9f1e1510133149d25dd144181cbe87d3934eaf", 0x44, 0x2}, {&(0x7f0000000880)="9d4a43", 0x3, 0x800}], 0x190000, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r7, &(0x7f0000000a40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000031c3adde6860100aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed7"], 0x3d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r7, r7, &(0x7f0000000140), 0x7fff) syz_init_net_socket$llc(0x1a, 0x0, 0x0) 07:21:53 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x10000}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="7121bfdc"], 0x4) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x200000) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f30f6f"], 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:21:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 296.601797] FAT-fs (loop2): bogus number of reserved sectors [ 296.619147] FAT-fs (loop2): Can't find a valid FAT filesystem [ 296.834329] FAT-fs (loop2): bogus number of reserved sectors [ 296.840185] FAT-fs (loop2): Can't find a valid FAT filesystem 07:21:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000340)={{0x0, 0x0, 0x1ff, 0x1, 0x8000}, 0x0, 0x867, 0xfff}) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) creat(&(0x7f0000000080)='./file0\x00', 0x6) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getgid() r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000040)={0x5, 0x6, 0x3, 0x1, 0x8, 0xd9e, 0xffffffff, 0xbd, 0x1298a363, 0x3e}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0xa80, 0x4) sendfile(r1, r3, &(0x7f0000000180), 0x100000001) 07:21:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) write$eventfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) getpeername(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x5, [0x4, 0x6, 0x4, 0x4, 0x9]}, &(0x7f0000000100)=0xe) ptrace$peekuser(0x3, 0x0, 0x0) 07:21:54 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f00000000c0)) ioctl$int_in(r0, 0x80000080045010, &(0x7f0000000200)) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000000)={0x7, 0x10000}) 07:21:54 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x9}, 0x28, 0x2) dup2(r2, r1) 07:21:54 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="2121172e2f66696c65300a"], 0xfdef) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) fcntl$notify(r1, 0x402, 0x20) 07:21:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000240)={{0x0, @remote, 0x4e20, 0x4, 'fo\x00', 0x23}, {@dev, 0x0, 0x0, 0x0, 0x0, 0x20}}, 0x44) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[{0x7, 0x7}], 0x200001de) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="920f34"]) socket$inet_sctp(0x2, 0x5, 0x84) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x0, 0x3ff}, &(0x7f00000003c0)=0x8) ioctl$KVM_RUN(r4, 0xae80, 0x0) 07:21:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:55 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x800008800000001) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000240)=0x1b) 07:21:55 executing program 5: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) mknod(&(0x7f0000f80000)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x9}, 0x28, 0x2) dup2(r2, r1) 07:21:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 298.122949] syz-executor3 (7818) used greatest stack depth: 13120 bytes left 07:21:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)=ANY=[@ANYBLOB="2121172e2f66696c65300a"], 0xfdef) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) fcntl$notify(r1, 0x402, 0x20) 07:21:55 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'bond0\x00'}) 07:21:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:55 executing program 1: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f00000000c0)='net/ip_tables_names\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback, 0x3}, {0xa, 0x4e22, 0x2, @remote}, 0x0, [0x0, 0x0, 0x10001, 0x8, 0x0, 0x0, 0x0, 0x80]}, 0x5c) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000070073010000e9000000ffffffff79400000080000d8adbcfd118db8152ecb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e49fd1a4fe501b362b0ae7854cdaad59c34e4076482195afe14688f7c8d9e58461982c96e271dd2e6c52018d1cff96daad95bdd228ac0eda42f324a1e1590447ec9a7b58757a01b264117ef55a1d60bea94457b6fbb2aa86a05f0cf0fcaddc3475ef551"], 0xa2) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000280)=""/78, 0x4e}, {&(0x7f0000000300)=""/82, 0x52}], 0x2, 0x0) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) preadv(r4, &(0x7f0000000900)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/108, 0x6c}, {&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/188, 0xbc}, {&(0x7f0000000880)=""/12, 0xc}, {&(0x7f00000008c0)=""/24, 0x18}], 0x6, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000001ef, 0x2}, 0x10}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000980)={0xffffffffffffd128, 0x4}) 07:21:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000005a00)=""/4096, 0x1000}], 0x1, &(0x7f0000000fc0)=""/38, 0x26}}], 0x1, 0x0, &(0x7f0000001500)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000001100)=[{{&(0x7f0000000ac0)=@alg, 0x80, &(0x7f0000000e40)=[{&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/71, 0x47}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000000c40)=""/30, 0x1d}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/83, 0x53}, {&(0x7f0000000d00)=""/108, 0x6c}], 0x386}}], 0x1, 0x0, &(0x7f0000000ec0)={0x77359400}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x70, 0x100) openat$cgroup(r2, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r1, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x0, &(0x7f0000000d80)}, 0x3}], 0x1, 0x40400d4) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000002c0)={@rand_addr, @loopback}, &(0x7f0000000300)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x8, 0x1, "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", 0x22, 0x0, 0x7ff, 0xfffffffffffffffe, 0x10001, 0xe7be, 0x1}, r3}}, 0x120) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 07:21:55 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000080)=""/104) creat(&(0x7f0000000100)='./file0\x00', 0x34) r2 = socket$inet_udp(0x2, 0x2, 0x0) splice(r2, 0x0, r1, 0x0, 0x4, 0x0) 07:21:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = semget(0xffffffffffffffff, 0x2, 0xa) semctl$GETVAL(r1, 0x1, 0xc, &(0x7f0000000640)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000600000000faf753e1d4002d45ac8500000000000000000000f0ff0000071027e8bc9d7e1c6578b7a670e66fe2ad937908cb3ae9831898901d8306a92c9342fe5931ec2845508cf6a2f20c93112596fcd31abde3b6a628c23a56f8db32740d"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:21:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x68) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000002900)={0xa97, 0x1}) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x100a}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x0, {0xeb2, 0x0, "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", 0x0, 0xffffffff, 0xfff, 0x0, 0x0, 0x1000}}}, 0x128) ioctl$KVM_SMI(r2, 0xaeb7) r3 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = dup2(r3, r2) io_setup(0x8000, &(0x7f0000000040)=0x0) io_submit(r6, 0x1, &(0x7f00000028c0)=[&(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000027c0)="34346ff7dc6845a6e21bb2f15b2762628c96142fa07f18e3a70172f43471", 0x1e, 0x10001, 0x0, 0x0, r5}]) sysfs$2(0x2, 0x1c0000000000, &(0x7f0000000500)=""/217) ftruncate(0xffffffffffffffff, 0x0) openat(r4, &(0x7f0000002940)='./file0\x00', 0x98000, 0x50) r7 = socket(0x0, 0x0, 0x0) write(r7, &(0x7f0000000dc0), 0x0) 07:21:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:56 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0), 0x0) 07:21:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000080), 0xc, &(0x7f0000000040)={&(0x7f0000010ec4)={0x14, 0x3d, 0x8aff, 0x100000000000, 0x0, {0x9}}, 0x14}}, 0xfffffffffffffffe) 07:21:57 executing program 1: r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f00000000c0)='net/ip_tables_names\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback, 0x3}, {0xa, 0x4e22, 0x2, @remote}, 0x0, [0x0, 0x0, 0x10001, 0x8, 0x0, 0x0, 0x0, 0x80]}, 0x5c) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000070073010000e9000000ffffffff79400000080000d8adbcfd118db8152ecb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e49fd1a4fe501b362b0ae7854cdaad59c34e4076482195afe14688f7c8d9e58461982c96e271dd2e6c52018d1cff96daad95bdd228ac0eda42f324a1e1590447ec9a7b58757a01b264117ef55a1d60bea94457b6fbb2aa86a05f0cf0fcaddc3475ef551"], 0xa2) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) preadv(r2, &(0x7f0000000500)=[{&(0x7f0000000280)=""/78, 0x4e}, {&(0x7f0000000300)=""/82, 0x52}], 0x2, 0x0) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) preadv(r4, &(0x7f0000000900)=[{&(0x7f0000000600)=""/10, 0xa}, {&(0x7f0000000640)=""/108, 0x6c}, {&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f00000007c0)=""/188, 0xbc}, {&(0x7f0000000880)=""/12, 0xc}, {&(0x7f00000008c0)=""/24, 0x18}], 0x6, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x20000000000001ef, 0x2}, 0x10}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000980)={0xffffffffffffd128, 0x4}) 07:21:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="6e65742f6465765f6d6361737400c087ea55011e14c9e347dd1f55a6026a1cb7e067f3c577981c0994a1e80d90d49d68bdbc91fab9c1c7f063e676e83c740e2d647534a1045850a23665d81ca07270193f5d003c10e34239844c5b6e8d1721c0b53a91c2f6ec1e5484645db3df") r1 = semget(0xffffffffffffffff, 0x2, 0xa) semctl$GETVAL(r1, 0x1, 0xc, &(0x7f0000000640)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000600000000faf753e1d4002d45ac8500000000000000000000f0ff0000071027e8bc9d7e1c6578b7a670e66fe2ad937908cb3ae9831898901d8306a92c9342fe5931ec2845508cf6a2f20c93112596fcd31abde3b6a628c23a56f8db32740d"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, &(0x7f0000000080), 0x0, 0x20000801, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="766574683100000000ffffffffffef00", 0x10) io_setup(0x7, &(0x7f0000000480)=0x0) io_getevents(r3, 0x8000, 0x9, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000600)={0x0, 0x1c9c380}) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:21:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0xffffffffa001c002, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300090c00000000000000000000000200030006000000000002000000e00000010000000000000000020001000000000000000002000000000302b5a7664e0572670005000000000002000000e000000104e1bb310000000000000000000000000000"], 0x60}}, 0x0) 07:21:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x68) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000002900)={0xa97, 0x1}) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x100a}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x0, {0xeb2, 0x0, "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", 0x0, 0xffffffff, 0xfff, 0x0, 0x0, 0x1000}}}, 0x128) ioctl$KVM_SMI(r2, 0xaeb7) r3 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = dup2(r3, r2) io_setup(0x8000, &(0x7f0000000040)=0x0) io_submit(r6, 0x1, &(0x7f00000028c0)=[&(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000027c0)="34346ff7dc6845a6e21bb2f15b2762628c96142fa07f18e3a70172f43471", 0x1e, 0x10001, 0x0, 0x0, r5}]) sysfs$2(0x2, 0x1c0000000000, &(0x7f0000000500)=""/217) ftruncate(0xffffffffffffffff, 0x0) openat(r4, &(0x7f0000002940)='./file0\x00', 0x98000, 0x50) r7 = socket(0x0, 0x0, 0x0) write(r7, &(0x7f0000000dc0), 0x0) 07:21:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={[{@dax='dax'}, {@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 299.753773] EXT4-fs: 12 callbacks suppressed [ 299.753788] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:21:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x68) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000002900)={0xa97, 0x1}) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x100a}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x0, {0xeb2, 0x0, "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", 0x0, 0xffffffff, 0xfff, 0x0, 0x0, 0x1000}}}, 0x128) ioctl$KVM_SMI(r2, 0xaeb7) r3 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = dup2(r3, r2) io_setup(0x8000, &(0x7f0000000040)=0x0) io_submit(r6, 0x1, &(0x7f00000028c0)=[&(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000027c0)="34346ff7dc6845a6e21bb2f15b2762628c96142fa07f18e3a70172f43471", 0x1e, 0x10001, 0x0, 0x0, r5}]) sysfs$2(0x2, 0x1c0000000000, &(0x7f0000000500)=""/217) ftruncate(0xffffffffffffffff, 0x0) openat(r4, &(0x7f0000002940)='./file0\x00', 0x98000, 0x50) r7 = socket(0x0, 0x0, 0x0) write(r7, &(0x7f0000000dc0), 0x0) [ 299.954689] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 299.973527] EXT4-fs (sda1): re-mounted. Opts: dax, 07:21:57 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRES16=r0], 0x2) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt_cache\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r1, 0x0, 0x2, &(0x7f0000000140)=']\x00', r2}, 0x30) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="a7"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:21:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 300.198829] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 300.213028] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 300.229835] EXT4-fs (sda1): re-mounted. Opts: dax, [ 300.266503] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:21:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 300.311972] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 300.371474] EXT4-fs (sda1): re-mounted. Opts: dax, [ 300.448768] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:21:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x68) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000002900)={0xa97, 0x1}) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x100a}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x0, {0xeb2, 0x0, "1544bf0309e6cb10e780634e3e2e776e57ddae3b25725c92a0b92141bc9d708cb38724ec47b636b010ab1eb209184dbbc5c91b64ba41d1addddc408edcd5c132394f20beb43cc04cf8f366cf3c0ed3cd7c0ad1a2904ddc7322dafd7e11c1cd4f4d18c6807374f8ef16eca1744d2fa70b5b061cfbd2781ac21aa29872a64888f1faff27cd17fde45738f5ca1acc5117e84e499a41a5c485192af20625b82d20c9df0db55867b6f93cb9036fe3edb9d371726697f36c156447b525e14f2d6e2c0da77325561b0d9055cf425c2bc897dffe12dc957e9d8074787766818ac2f069a7d036f42aa302fec9e99681e1ff84bf74b94c63c7879b85c811ccbed6c463d99e", 0x0, 0xffffffff, 0xfff, 0x0, 0x0, 0x1000}}}, 0x128) ioctl$KVM_SMI(r2, 0xaeb7) r3 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = dup2(r3, r2) io_setup(0x8000, &(0x7f0000000040)=0x0) io_submit(r6, 0x1, &(0x7f00000028c0)=[&(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000027c0)="34346ff7dc6845a6e21bb2f15b2762628c96142fa07f18e3a70172f43471", 0x1e, 0x10001, 0x0, 0x0, r5}]) sysfs$2(0x2, 0x1c0000000000, &(0x7f0000000500)=""/217) ftruncate(0xffffffffffffffff, 0x0) openat(r4, &(0x7f0000002940)='./file0\x00', 0x98000, 0x50) r7 = socket(0x0, 0x0, 0x0) write(r7, &(0x7f0000000dc0), 0x0) 07:21:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0xfffffffffffffe3d) io_setup(0x2, &(0x7f0000000340)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3, r0, &(0x7f0000000040)="d9", 0x1}]) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000200)={0x3f, 0x6, 0x6, 0x0, 0x3f}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x800) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000100)={0x7, 0xf35a, 0x8001}) getsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000380)={'filter\x00', 0x7, 0x4, 0x470, 0x0, 0x270, 0x140, 0x388, 0x388, 0x388, 0x4, &(0x7f00000000c0), {[{{@arp={@multicast1, @rand_addr=0xfff, 0xff000000, 0xffffffff, @empty, {[0x0, 0xff, 0xff, 0x0, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0xff, 0xff, 0x9dae685300ce6668]}, 0x3f, 0x24, 0x3, 0xff, 0x4, 0x1, 'ip6_vti0\x00', 'nr0\x00', {}, {0xff}, 0x0, 0x100}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @broadcast, 0xf, 0xffffffff}}}, {{@arp={@loopback, @rand_addr=0x2, 0x0, 0xffffffff, @mac=@dev, {[0xff, 0xff, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0x0, 0xffffffffffffff93, 0x2, 0x0, 0x8a, 0xffffffffffffff00, 'erspan0\x00', 'veth0\x00', {0xff}, {0xff}, 0x0, 0x200}, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0xd6, 0x5, 0x5}}}, {{@uncond, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) connect$l2tp(r2, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x2, 0x0, 0x0, {0xa, 0x4e24, 0x7, @mcast1, 0x2}}}, 0x3a) accept4$vsock_stream(r2, &(0x7f0000000180)={0x28, 0x0, 0x2710}, 0x10, 0x80000) 07:21:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x1000) set_robust_list(&(0x7f00000002c0)={&(0x7f00000001c0)={&(0x7f0000000140)}, 0x1f, &(0x7f0000000280)={&(0x7f0000000240)}}, 0x18) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_ENTRY(r0, &(0x7f0000000580)={0x90, 0x0, 0x2}, 0x90) getdents(r2, &(0x7f0000000700)=""/185, 0x1c8) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0x0, 0x4}, 0x18) 07:21:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:58 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 300.912064] FAULT_INJECTION: forcing a failure. [ 300.912064] name failslab, interval 1, probability 0, space 0, times 1 [ 300.937366] CPU: 0 PID: 8054 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 300.944269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.953642] Call Trace: [ 300.956275] dump_stack+0x244/0x39d [ 300.959920] ? dump_stack_print_info.cold.1+0x20/0x20 [ 300.965126] ? lock_downgrade+0x900/0x900 [ 300.969296] should_fail.cold.4+0xa/0x17 [ 300.973368] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 300.978511] ? lock_downgrade+0x900/0x900 [ 300.982672] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.988224] ? proc_fail_nth_write+0x9e/0x210 [ 300.992724] ? proc_cwd_link+0x1d0/0x1d0 [ 300.996797] ? find_held_lock+0x36/0x1c0 [ 301.000889] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.006353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.011899] __should_failslab+0x124/0x180 [ 301.016145] should_failslab+0x9/0x14 [ 301.019949] __kmalloc+0x2e0/0x760 [ 301.023494] ? strncpy_from_user+0x5a0/0x5a0 [ 301.027910] ? fput+0x130/0x1a0 [ 301.031195] ? do_syscall_64+0x9a/0x820 [ 301.035171] ? __x64_sys_memfd_create+0x142/0x4f0 [ 301.040014] ? do_syscall_64+0x9a/0x820 [ 301.043995] __x64_sys_memfd_create+0x142/0x4f0 [ 301.048675] ? memfd_fcntl+0x1910/0x1910 [ 301.052756] do_syscall_64+0x1b9/0x820 [ 301.056671] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.062045] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.066974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.071822] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.076844] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.081868] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.086895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.091751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.096940] RIP: 0033:0x457569 07:21:58 executing program 5 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 301.100140] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.119044] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.126755] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 301.134027] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 301.141296] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 301.148565] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1f25b0d6d4 [ 301.155836] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:21:58 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:58 executing program 2: clock_gettime(0x0, &(0x7f0000001b80)) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@hyper}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffc, 0x0, 0x0, 0x10000002, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7, 0x10000) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x9, 0x8, 0x9, 0x20, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_x_sec_ctx={0xc, 0x18, 0xffffffffffffff7f, 0x2, 0x56, "0d3c85fed15fbd38fcb2a54f8af36f2b2209dda32a0ca2fefd88c3213a16e470395b95dbd99b2d3cf92dff15c4b96c10b7ebce46ca4efc4dfdb587fc510abee62d2449dfd5c3f751a906eab001942fb95fc4447e546c"}, @sadb_key={0x12, 0x8, 0x428, 0x0, "285d062d8d22b56b0ea3570eb895e8c13ef43122958fb92446a9f55d1d5385097553aa18f6925dad64ae7c76a333a54f9a4ca34390282e43d3ffc6362b8d72bb2f84db7f67f102cc51197e85ec47b111ea49c3703ea5fdc9cd129b6315f21eb7200b943c00e454e74a766de4664ed1fbce8943d54ae1975747cb274c225c780e051c905bd3"}]}, 0x100}}, 0x4000000) r2 = socket$key(0xf, 0x3, 0x2) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2081200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x94, r3, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfe65}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc9b}]}, 0x94}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) sendmsg$key(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000009c0)=ANY=[@ANYBLOB="021300060200000026bd700000000000"], 0x10}}, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) [ 301.249540] FAULT_INJECTION: forcing a failure. [ 301.249540] name failslab, interval 1, probability 0, space 0, times 0 [ 301.289930] FAULT_INJECTION: forcing a failure. [ 301.289930] name failslab, interval 1, probability 0, space 0, times 0 [ 301.331934] CPU: 1 PID: 8073 Comm: syz-executor5 Not tainted 4.19.0+ #87 [ 301.338834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.348204] Call Trace: [ 301.350814] dump_stack+0x244/0x39d [ 301.354477] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.359691] ? lock_downgrade+0x900/0x900 [ 301.363865] should_fail.cold.4+0xa/0x17 [ 301.367946] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.373069] ? lock_downgrade+0x900/0x900 [ 301.377231] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.382792] ? proc_fail_nth_write+0x9e/0x210 [ 301.387296] ? proc_cwd_link+0x1d0/0x1d0 [ 301.391376] ? find_held_lock+0x36/0x1c0 [ 301.395485] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.400951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.406504] __should_failslab+0x124/0x180 [ 301.410756] should_failslab+0x9/0x14 [ 301.414566] __kmalloc+0x2e0/0x760 [ 301.418121] ? strncpy_from_user+0x5a0/0x5a0 [ 301.422548] ? fput+0x130/0x1a0 [ 301.425844] ? do_syscall_64+0x9a/0x820 [ 301.429826] ? __x64_sys_memfd_create+0x142/0x4f0 [ 301.434680] ? do_syscall_64+0x9a/0x820 [ 301.438677] __x64_sys_memfd_create+0x142/0x4f0 [ 301.443360] ? memfd_fcntl+0x1910/0x1910 [ 301.447455] do_syscall_64+0x1b9/0x820 [ 301.451369] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.456749] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.461692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.466551] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.471586] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.476614] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.481654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.486526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.491727] RIP: 0033:0x457569 [ 301.494931] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.513846] RSP: 002b:00007f29ddbf7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.521566] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 301.528849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 301.536131] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 301.543622] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f29ddbf86d4 [ 301.550906] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 301.560554] CPU: 0 PID: 8080 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 301.567435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.576805] Call Trace: [ 301.579401] dump_stack+0x244/0x39d [ 301.583154] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.588375] should_fail.cold.4+0xa/0x17 [ 301.592459] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.597584] ? find_held_lock+0x36/0x1c0 [ 301.601651] ? zap_class+0x640/0x640 [ 301.605367] ? __lock_acquire+0x62f/0x4c20 [ 301.609616] ? lock_downgrade+0x900/0x900 [ 301.613780] ? check_preemption_disabled+0x48/0x280 [ 301.618819] ? find_held_lock+0x36/0x1c0 [ 301.622918] ? expand_files.part.8+0x571/0x9a0 [ 301.627515] ? perf_trace_sched_process_exec+0x860/0x860 07:21:59 executing program 5 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 301.632990] ? find_held_lock+0x36/0x1c0 [ 301.637077] __should_failslab+0x124/0x180 [ 301.641331] should_failslab+0x9/0x14 [ 301.645149] kmem_cache_alloc+0x2be/0x730 [ 301.649321] ? shmem_destroy_callback+0xc0/0xc0 [ 301.654039] shmem_alloc_inode+0x1b/0x40 [ 301.658104] alloc_inode+0x63/0x190 [ 301.661722] new_inode_pseudo+0x71/0x1a0 [ 301.665773] ? prune_icache_sb+0x1c0/0x1c0 [ 301.670002] ? _raw_spin_unlock+0x2c/0x50 [ 301.674314] new_inode+0x1c/0x40 [ 301.677672] shmem_get_inode+0xf1/0x920 [ 301.681763] ? shmem_encode_fh+0x340/0x340 [ 301.685991] ? lock_downgrade+0x900/0x900 [ 301.690143] ? lock_release+0xa00/0xa00 [ 301.694116] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.699555] ? usercopy_warn+0x110/0x110 [ 301.703609] __shmem_file_setup.part.50+0x83/0x2a0 [ 301.708641] shmem_file_setup+0x65/0x90 [ 301.712645] __x64_sys_memfd_create+0x2af/0x4f0 [ 301.712662] ? memfd_fcntl+0x1910/0x1910 [ 301.712699] do_syscall_64+0x1b9/0x820 [ 301.712723] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 301.721579] ? syscall_return_slowpath+0x5e0/0x5e0 [ 301.721596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.721616] ? trace_hardirqs_on_caller+0x310/0x310 [ 301.721633] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 301.721651] ? prepare_exit_to_usermode+0x291/0x3b0 [ 301.721672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.730923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.730937] RIP: 0033:0x457569 07:21:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x400800, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx2\x00'}, 0x58) r3 = accept4$alg(r1, 0x0, 0x0, 0x80080004) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000140)=0x2ad, 0x1) sendfile(r3, r2, &(0x7f000025d000), 0x1000) [ 301.730957] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.787785] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.795498] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 301.802757] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 301.810030] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 301.817284] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1f25b0d6d4 [ 301.824540] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 301.899246] FAULT_INJECTION: forcing a failure. [ 301.899246] name failslab, interval 1, probability 0, space 0, times 0 [ 301.911013] CPU: 0 PID: 8092 Comm: syz-executor5 Not tainted 4.19.0+ #87 [ 301.917867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.927221] Call Trace: [ 301.927249] dump_stack+0x244/0x39d [ 301.927270] ? dump_stack_print_info.cold.1+0x20/0x20 [ 301.927302] should_fail.cold.4+0xa/0x17 [ 301.927325] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 301.927349] ? find_held_lock+0x36/0x1c0 [ 301.927374] ? zap_class+0x640/0x640 [ 301.927391] ? __lock_acquire+0x62f/0x4c20 [ 301.927407] ? lock_downgrade+0x900/0x900 [ 301.927434] ? check_preemption_disabled+0x48/0x280 [ 301.927461] ? find_held_lock+0x36/0x1c0 [ 301.927500] ? expand_files.part.8+0x571/0x9a0 [ 301.927519] ? perf_trace_sched_process_exec+0x860/0x860 [ 301.927539] ? find_held_lock+0x36/0x1c0 [ 301.964471] __should_failslab+0x124/0x180 [ 301.964496] should_failslab+0x9/0x14 [ 301.964514] kmem_cache_alloc+0x2be/0x730 [ 301.964539] ? shmem_destroy_callback+0xc0/0xc0 [ 301.964560] shmem_alloc_inode+0x1b/0x40 [ 301.973726] alloc_inode+0x63/0x190 [ 301.973745] new_inode_pseudo+0x71/0x1a0 [ 301.973760] ? prune_icache_sb+0x1c0/0x1c0 [ 301.973783] ? _raw_spin_unlock+0x2c/0x50 [ 301.973802] new_inode+0x1c/0x40 [ 301.973820] shmem_get_inode+0xf1/0x920 [ 302.032024] ? shmem_encode_fh+0x340/0x340 [ 302.036250] ? lock_downgrade+0x900/0x900 [ 302.040388] ? lock_release+0xa00/0xa00 [ 302.044361] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.049816] ? usercopy_warn+0x110/0x110 [ 302.053880] __shmem_file_setup.part.50+0x83/0x2a0 [ 302.058807] shmem_file_setup+0x65/0x90 [ 302.062774] __x64_sys_memfd_create+0x2af/0x4f0 [ 302.067438] ? memfd_fcntl+0x1910/0x1910 [ 302.071515] do_syscall_64+0x1b9/0x820 [ 302.075410] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.080774] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.085695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.090529] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.095577] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.100598] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.105611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.110466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.115645] RIP: 0033:0x457569 [ 302.118827] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.137714] RSP: 002b:00007f29ddbf7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 302.145433] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 302.152694] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 302.159966] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 302.167270] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f29ddbf86d4 [ 302.174529] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:21:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x68) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000002900)={0xa97, 0x1}) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x100a}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x0, {0xeb2, 0x0, "1544bf0309e6cb10e780634e3e2e776e57ddae3b25725c92a0b92141bc9d708cb38724ec47b636b010ab1eb209184dbbc5c91b64ba41d1addddc408edcd5c132394f20beb43cc04cf8f366cf3c0ed3cd7c0ad1a2904ddc7322dafd7e11c1cd4f4d18c6807374f8ef16eca1744d2fa70b5b061cfbd2781ac21aa29872a64888f1faff27cd17fde45738f5ca1acc5117e84e499a41a5c485192af20625b82d20c9df0db55867b6f93cb9036fe3edb9d371726697f36c156447b525e14f2d6e2c0da77325561b0d9055cf425c2bc897dffe12dc957e9d8074787766818ac2f069a7d036f42aa302fec9e99681e1ff84bf74b94c63c7879b85c811ccbed6c463d99e", 0x0, 0xffffffff, 0xfff, 0x0, 0x0, 0x1000}}}, 0x128) ioctl$KVM_SMI(r2, 0xaeb7) r3 = syz_open_dev$sndpcmp(&(0x7f000000afee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = dup2(r3, r2) io_setup(0x8000, &(0x7f0000000040)=0x0) io_submit(r6, 0x1, &(0x7f00000028c0)=[&(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000027c0)="34346ff7dc6845a6e21bb2f15b2762628c96142fa07f18e3a70172f43471", 0x1e, 0x10001, 0x0, 0x0, r5}]) sysfs$2(0x2, 0x1c0000000000, &(0x7f0000000500)=""/217) ftruncate(0xffffffffffffffff, 0x0) openat(r4, &(0x7f0000002940)='./file0\x00', 0x98000, 0x50) r7 = socket(0x0, 0x0, 0x0) write(r7, &(0x7f0000000dc0), 0x0) 07:21:59 executing program 4 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:21:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400202) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0x7, 0x3, 0x0, 0x9, 0x81}, 0xfffffebd) r3 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x3, 0x800) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000180)={0x4, 0x7, 0x1, 0xffffffffffffffee, 0x2, 0x3, 0x9}) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1668) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_int(r4, 0x21, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$inet_dccp_buf(r3, 0x21, 0x0, &(0x7f00000002c0)="eb58fc8571bc0bf1c9434b8036feecdc2a1e9a78e3b5f5b3ecd558b87f1303132d8a9c29e179056440392895cf539cbeda37420d253cf4dc96acdff9a2dc8b5ae88334076e4beea1d36e533fbd97bed94eaf7db5658f4030fa08df15fe6d7012b605ea51d4d0ec9131d57fcbdeafcb", 0x6f) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000100)=0x2000000000007, 0x241) sendto$inet6(r0, &(0x7f0000000080)='z', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r5 = msgget(0x3, 0x42c) msgctl$IPC_INFO(r5, 0x3, &(0x7f0000000000)=""/63) 07:21:59 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:21:59 executing program 5 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 302.309545] FAULT_INJECTION: forcing a failure. [ 302.309545] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 302.321444] CPU: 0 PID: 8103 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 302.328310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.330974] FAULT_INJECTION: forcing a failure. [ 302.330974] name failslab, interval 1, probability 0, space 0, times 0 [ 302.337691] Call Trace: [ 302.337720] dump_stack+0x244/0x39d [ 302.337745] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.337778] ? zap_class+0x640/0x640 [ 302.364046] ? print_usage_bug+0xc0/0xc0 [ 302.368226] should_fail.cold.4+0xa/0x17 [ 302.372308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.377439] ? find_held_lock+0x36/0x1c0 [ 302.381530] ? get_mem_cgroup_from_mm.part.62+0x204/0x880 [ 302.387084] ? lock_downgrade+0x900/0x900 [ 302.391246] ? check_preemption_disabled+0x48/0x280 [ 302.396288] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 302.401247] ? kasan_check_read+0x11/0x20 [ 302.405407] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 302.410740] ? zap_class+0x640/0x640 [ 302.414492] ? rcu_softirq_qs+0x20/0x20 [ 302.418528] ? rcu_read_unlock+0x16/0x60 [ 302.422602] __alloc_pages_nodemask+0x34b/0xde0 [ 302.427310] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 302.432256] ? kasan_check_read+0x11/0x20 [ 302.436455] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 302.441485] ? __lock_is_held+0xb5/0x140 [ 302.445573] ? rcu_read_unlock+0x33/0x60 [ 302.449668] ? trace_hardirqs_off+0xb8/0x310 [ 302.454096] cache_grow_begin+0xa5/0x8c0 [ 302.458174] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.463726] ? check_preemption_disabled+0x48/0x280 [ 302.468777] kmem_cache_alloc+0x66b/0x730 [ 302.472961] ? shmem_destroy_callback+0xc0/0xc0 [ 302.477646] shmem_alloc_inode+0x1b/0x40 [ 302.481728] alloc_inode+0x63/0x190 [ 302.485369] new_inode_pseudo+0x71/0x1a0 [ 302.489449] ? prune_icache_sb+0x1c0/0x1c0 [ 302.493714] ? _raw_spin_unlock+0x2c/0x50 [ 302.497877] new_inode+0x1c/0x40 [ 302.501255] shmem_get_inode+0xf1/0x920 [ 302.505248] ? shmem_encode_fh+0x340/0x340 [ 302.509504] ? lock_downgrade+0x900/0x900 [ 302.513670] ? lock_release+0xa00/0xa00 [ 302.517668] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.523141] ? usercopy_warn+0x110/0x110 [ 302.527229] __shmem_file_setup.part.50+0x83/0x2a0 [ 302.532209] shmem_file_setup+0x65/0x90 [ 302.536229] __x64_sys_memfd_create+0x2af/0x4f0 [ 302.541143] ? memfd_fcntl+0x1910/0x1910 [ 302.545229] do_syscall_64+0x1b9/0x820 [ 302.549130] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.554504] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.559447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.564305] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.569335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.574372] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.579402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.584276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.589470] RIP: 0033:0x457569 [ 302.592671] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.611587] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 302.619299] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 302.626569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 302.633840] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 302.641111] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1f25b0d6d4 [ 302.648398] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 302.655713] CPU: 1 PID: 8111 Comm: syz-executor5 Not tainted 4.19.0+ #87 [ 302.662576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.671933] Call Trace: [ 302.674541] dump_stack+0x244/0x39d [ 302.678195] ? dump_stack_print_info.cold.1+0x20/0x20 [ 302.683396] ? find_held_lock+0x36/0x1c0 [ 302.687491] should_fail.cold.4+0xa/0x17 [ 302.691576] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 302.696732] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 302.701705] ? kasan_check_read+0x11/0x20 [ 302.705872] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 302.711164] ? rcu_softirq_qs+0x20/0x20 [ 302.715156] ? rcu_softirq_qs+0x20/0x20 [ 302.719149] ? unwind_dump+0x190/0x190 [ 302.723064] ? is_bpf_text_address+0xd3/0x170 [ 302.727572] ? kernel_text_address+0x79/0xf0 [ 302.731991] ? __kernel_text_address+0xd/0x40 [ 302.736503] ? unwind_get_return_address+0x61/0xa0 [ 302.741458] ? __save_stack_trace+0x8d/0xf0 [ 302.745822] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.751303] ? save_stack+0x43/0xd0 [ 302.754942] ? kasan_kmalloc+0xc7/0xe0 07:22:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x88000, 0x0) fchmod(r0, 0x100) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r3 = msgget(0x3, 0x400) msgctl$IPC_RMID(r3, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) pread64(r2, &(0x7f0000000000)=""/21, 0x15, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r5}) fcntl$notify(r2, 0x402, 0x2) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[@ANYRES32=r4], 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 302.758844] ? kasan_slab_alloc+0x12/0x20 [ 302.763003] ? kmem_cache_alloc+0x12e/0x730 [ 302.767343] ? shmem_alloc_inode+0x1b/0x40 [ 302.771599] __should_failslab+0x124/0x180 [ 302.775857] should_failslab+0x9/0x14 [ 302.779674] kmem_cache_alloc+0x2be/0x730 [ 302.783846] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 302.788877] ? map_id_range_down+0x1ee/0x430 [ 302.793386] new_inode_smack+0x20/0xb0 [ 302.797314] smack_inode_alloc_security+0x92/0x100 [ 302.802264] security_inode_alloc+0x73/0xd0 [ 302.806603] inode_init_always+0x68f/0xd80 [ 302.810846] ? get_nr_inodes+0x120/0x120 [ 302.814925] ? rcu_pm_notify+0xc0/0xc0 [ 302.818835] ? rcu_read_lock_sched_held+0x14f/0x180 [ 302.823860] ? kmem_cache_alloc+0x33a/0x730 [ 302.828200] ? shmem_alloc_inode+0x1b/0x40 [ 302.832452] ? shmem_destroy_callback+0xc0/0xc0 [ 302.837131] alloc_inode+0x80/0x190 [ 302.840781] new_inode_pseudo+0x71/0x1a0 [ 302.844863] ? prune_icache_sb+0x1c0/0x1c0 [ 302.849114] ? _raw_spin_unlock+0x2c/0x50 [ 302.853289] new_inode+0x1c/0x40 [ 302.856668] shmem_get_inode+0xf1/0x920 [ 302.860672] ? shmem_encode_fh+0x340/0x340 [ 302.864920] ? lock_downgrade+0x900/0x900 [ 302.869084] ? lock_release+0xa00/0xa00 [ 302.873070] ? perf_trace_sched_process_exec+0x860/0x860 [ 302.878553] ? usercopy_warn+0x110/0x110 [ 302.882648] __shmem_file_setup.part.50+0x83/0x2a0 [ 302.887593] shmem_file_setup+0x65/0x90 [ 302.891605] __x64_sys_memfd_create+0x2af/0x4f0 [ 302.896309] ? memfd_fcntl+0x1910/0x1910 [ 302.900392] do_syscall_64+0x1b9/0x820 [ 302.904299] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 302.909677] ? syscall_return_slowpath+0x5e0/0x5e0 [ 302.914618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.919479] ? trace_hardirqs_on_caller+0x310/0x310 [ 302.924512] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 302.929552] ? prepare_exit_to_usermode+0x291/0x3b0 [ 302.934613] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.939480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.944677] RIP: 0033:0x457569 [ 302.947884] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.966808] RSP: 002b:00007f29ddbf7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 302.974524] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 302.981799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 302.989073] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 302.996344] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f29ddbf86d4 [ 303.003622] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:00 executing program 5 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:00 executing program 4 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280), 0x0, 0xfffffffffffffffc) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x400) 07:22:00 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004880)=[{{&(0x7f0000000200)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000500)=""/172, 0xac}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/162, 0xa2}], 0x3, 0x0, 0x0, 0x4}, 0x8}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001680)=""/255, 0xff}, {&(0x7f0000001780)=""/199, 0xc7}, {&(0x7f0000001880)=""/247, 0xf7}], 0x3, &(0x7f0000000380)=""/107, 0x6b, 0x7}, 0x8001}, {{&(0x7f0000001980)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001cc0)=[{&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f0000001a00)=""/113, 0x71}, {&(0x7f0000001a80)=""/131, 0x83}, {&(0x7f0000001b40)=""/165, 0xa5}, {&(0x7f0000001c00)=""/150, 0x96}], 0x5, &(0x7f0000001d40)=""/100, 0x64, 0x100000001}, 0x396}, {{&(0x7f0000001dc0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001e40)=""/33, 0x21}, {&(0x7f0000001e80)=""/20, 0x14}, {&(0x7f0000001ec0)=""/208, 0xd0}], 0x3, 0x0, 0x0, 0x3}}, {{&(0x7f0000002000)=@rc, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002080)=""/3, 0x3}, {&(0x7f00000020c0)=""/4096, 0x1000}], 0x2, &(0x7f0000003100)=""/208, 0xd0, 0x4}, 0x4}, {{&(0x7f0000003200)=@pppoe, 0x80, &(0x7f0000003640)=[{&(0x7f0000003280)=""/75, 0x4b}, {&(0x7f0000003300)=""/18, 0x12}, {&(0x7f0000003340)=""/188, 0xbc}, {&(0x7f0000003400)=""/186, 0xba}, {&(0x7f00000034c0)=""/249, 0xf9}, {&(0x7f00000035c0)=""/46, 0x2e}, {&(0x7f0000003600)=""/30, 0x1e}], 0x7, &(0x7f00000036c0)=""/4096, 0x1000, 0x2}, 0x1}, {{&(0x7f00000046c0)=@nl=@proc, 0x80, &(0x7f00000047c0)=[{&(0x7f0000004740)=""/106, 0x6a}], 0x1, &(0x7f0000004800)=""/97, 0x61, 0x7ff}, 0x7fff}], 0x7, 0x102, &(0x7f0000004a40)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000004a80)={@empty, r1}, 0x14) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') getpid() modify_ldt$write2(0x11, &(0x7f0000004b00)={0x5, 0x100000, 0x1000, 0x285, 0x6, 0x9, 0x800, 0xfffffffffffffffa, 0x8001, 0xff}, 0x10) bind$bt_l2cap(r0, &(0x7f0000004ac0)={0x1f, 0x9, {0x867b, 0x3f, 0x1, 0x8, 0x9, 0x3}, 0x1ff, 0x2cf8b31c}, 0xe) getdents64(r2, &(0x7f0000000400)=""/229, 0x3ca55b16) [ 303.258000] FAULT_INJECTION: forcing a failure. [ 303.258000] name failslab, interval 1, probability 0, space 0, times 0 [ 303.288012] CPU: 0 PID: 8139 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 303.294892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.297397] FAULT_INJECTION: forcing a failure. [ 303.297397] name failslab, interval 1, probability 0, space 0, times 0 [ 303.304250] Call Trace: [ 303.304278] dump_stack+0x244/0x39d [ 303.304308] ? dump_stack_print_info.cold.1+0x20/0x20 [ 303.326870] ? debug_smp_processor_id+0x1c/0x20 [ 303.331549] ? perf_trace_lock+0x14d/0x7a0 [ 303.335802] should_fail.cold.4+0xa/0x17 [ 303.339878] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.344995] ? check_preemption_disabled+0x48/0x280 [ 303.350057] ? perf_trace_lock+0x14d/0x7a0 [ 303.354331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.359877] ? check_preemption_disabled+0x48/0x280 [ 303.364900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.370456] ? lock_is_held_type+0x210/0x210 [ 303.374874] ? debug_smp_processor_id+0x1c/0x20 [ 303.379550] ? perf_trace_lock+0x14d/0x7a0 [ 303.383802] ? find_held_lock+0x36/0x1c0 [ 303.387895] ? perf_trace_sched_process_exec+0x860/0x860 [ 303.393365] __should_failslab+0x124/0x180 [ 303.397616] should_failslab+0x9/0x14 [ 303.401434] kmem_cache_alloc+0x2be/0x730 [ 303.405590] ? mpol_shared_policy_init+0x235/0x650 [ 303.410526] ? current_time+0x72/0x1b0 [ 303.414439] __d_alloc+0xc8/0xb90 [ 303.417907] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 303.422928] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 303.427954] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 303.433174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.438722] ? timespec64_trunc+0xea/0x180 [ 303.442967] ? inode_init_owner+0x340/0x340 [ 303.447302] ? _raw_spin_unlock+0x2c/0x50 [ 303.451463] ? current_time+0x131/0x1b0 [ 303.455455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.461001] ? __lockdep_init_map+0x105/0x590 [ 303.465508] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 303.471055] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 303.476612] d_alloc_pseudo+0x1d/0x30 [ 303.480435] alloc_file_pseudo+0x158/0x3f0 [ 303.484688] ? alloc_file+0x4d0/0x4d0 [ 303.488506] ? usercopy_warn+0x110/0x110 [ 303.492617] __shmem_file_setup.part.50+0x110/0x2a0 [ 303.497652] shmem_file_setup+0x65/0x90 [ 303.501642] __x64_sys_memfd_create+0x2af/0x4f0 [ 303.506317] ? memfd_fcntl+0x1910/0x1910 [ 303.510403] do_syscall_64+0x1b9/0x820 [ 303.514309] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.519689] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.524627] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.529478] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.534511] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.539761] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.544793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.549654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.554852] RIP: 0033:0x457569 [ 303.558056] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.576961] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 303.584673] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 303.592768] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 303.600076] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 303.607352] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1f25b0d6d4 [ 303.614625] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 303.621930] CPU: 1 PID: 8142 Comm: syz-executor5 Not tainted 4.19.0+ #87 [ 303.628792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.638152] Call Trace: [ 303.640774] dump_stack+0x244/0x39d [ 303.644437] ? dump_stack_print_info.cold.1+0x20/0x20 [ 303.649657] should_fail.cold.4+0xa/0x17 [ 303.653740] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:22:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x88000, 0x0) fchmod(r0, 0x100) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) mmap(&(0x7f00000db000/0x2000)=nil, 0x2000, 0x3, 0x40010, 0xffffffffffffffff, 0x1000) r3 = msgget(0x3, 0x400) msgctl$IPC_RMID(r3, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) pread64(r2, &(0x7f0000000000)=""/21, 0x15, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000280)=0x9) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000001c0)={[], 0x7, 0x5, 0x4, 0x9, 0xffffffff, r5}) fcntl$notify(r2, 0x402, 0x2) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[@ANYRES32=r4], 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 07:22:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 303.658856] ? __kernel_text_address+0xd/0x40 [ 303.663413] ? unwind_get_return_address+0x61/0xa0 [ 303.668382] ? __lockdep_init_map+0x105/0x590 [ 303.673352] ? lockdep_init_map+0x9/0x10 [ 303.677450] ? debug_mutex_init+0x2d/0x60 [ 303.681621] ? find_held_lock+0x36/0x1c0 [ 303.685726] ? perf_trace_sched_process_exec+0x860/0x860 [ 303.691243] __should_failslab+0x124/0x180 [ 303.695496] should_failslab+0x9/0x14 [ 303.699320] kmem_cache_alloc+0x2be/0x730 [ 303.703559] ? mpol_shared_policy_init+0x235/0x650 07:22:01 executing program 4 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 303.708506] ? current_time+0x72/0x1b0 [ 303.712417] __d_alloc+0xc8/0xb90 [ 303.715919] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 303.720949] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 303.725982] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 303.731197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.736748] ? timespec64_trunc+0xea/0x180 [ 303.740998] ? inode_init_owner+0x340/0x340 [ 303.745353] ? _raw_spin_unlock+0x2c/0x50 [ 303.749520] ? current_time+0x131/0x1b0 [ 303.753506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.759056] ? __lockdep_init_map+0x105/0x590 [ 303.763568] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 303.769112] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 303.774674] d_alloc_pseudo+0x1d/0x30 [ 303.778484] alloc_file_pseudo+0x158/0x3f0 [ 303.782745] ? alloc_file+0x4d0/0x4d0 [ 303.786558] ? usercopy_warn+0x110/0x110 [ 303.790646] __shmem_file_setup.part.50+0x110/0x2a0 [ 303.795680] shmem_file_setup+0x65/0x90 [ 303.799669] __x64_sys_memfd_create+0x2af/0x4f0 [ 303.804346] ? memfd_fcntl+0x1910/0x1910 [ 303.808440] do_syscall_64+0x1b9/0x820 [ 303.812338] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 303.817713] ? syscall_return_slowpath+0x5e0/0x5e0 [ 303.822664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.827519] ? trace_hardirqs_on_caller+0x310/0x310 [ 303.832559] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 303.837585] ? prepare_exit_to_usermode+0x291/0x3b0 [ 303.842618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.847487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.852683] RIP: 0033:0x457569 [ 303.855886] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.874794] RSP: 002b:00007f29ddbf7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 303.882507] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 303.889780] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 303.897051] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 303.904327] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f29ddbf86d4 [ 303.911599] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000280), 0x0, 0xfffffffffffffffc) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x400) [ 304.002107] FAULT_INJECTION: forcing a failure. [ 304.002107] name failslab, interval 1, probability 0, space 0, times 0 [ 304.039636] CPU: 0 PID: 8157 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 304.046517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.055877] Call Trace: [ 304.058485] dump_stack+0x244/0x39d [ 304.062147] ? dump_stack_print_info.cold.1+0x20/0x20 [ 304.067365] ? __save_stack_trace+0x8d/0xf0 [ 304.071731] should_fail.cold.4+0xa/0x17 [ 304.075820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.080946] ? smack_d_instantiate+0x136/0xea0 [ 304.085549] ? save_stack+0x43/0xd0 [ 304.089196] ? kasan_kmalloc+0xc7/0xe0 [ 304.093108] ? find_held_lock+0x36/0x1c0 [ 304.097185] ? zap_class+0x640/0x640 [ 304.100920] ? find_held_lock+0x36/0x1c0 [ 304.105023] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.110486] ? lock_downgrade+0x900/0x900 [ 304.114670] __should_failslab+0x124/0x180 [ 304.118930] should_failslab+0x9/0x14 [ 304.122741] kmem_cache_alloc+0x2be/0x730 [ 304.126898] ? d_set_d_op+0x31d/0x410 [ 304.130726] __alloc_file+0xa8/0x470 [ 304.134475] ? file_free_rcu+0xd0/0xd0 [ 304.138376] ? d_instantiate+0x79/0xa0 [ 304.142324] ? lock_downgrade+0x900/0x900 [ 304.146491] ? kasan_check_read+0x11/0x20 [ 304.150677] ? do_raw_spin_unlock+0xa7/0x330 [ 304.155104] ? do_raw_spin_trylock+0x270/0x270 [ 304.159708] alloc_empty_file+0x72/0x170 [ 304.163799] alloc_file+0x5e/0x4d0 [ 304.167353] ? _raw_spin_unlock+0x2c/0x50 [ 304.171518] alloc_file_pseudo+0x261/0x3f0 [ 304.175772] ? alloc_file+0x4d0/0x4d0 [ 304.179586] ? usercopy_warn+0x110/0x110 [ 304.183677] __shmem_file_setup.part.50+0x110/0x2a0 [ 304.188747] shmem_file_setup+0x65/0x90 [ 304.192737] __x64_sys_memfd_create+0x2af/0x4f0 [ 304.197428] ? memfd_fcntl+0x1910/0x1910 [ 304.201516] do_syscall_64+0x1b9/0x820 [ 304.205462] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.210833] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.215771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.220659] ? trace_hardirqs_on_caller+0x310/0x310 [ 304.225698] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 304.230727] ? prepare_exit_to_usermode+0x291/0x3b0 [ 304.235775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.240654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.245857] RIP: 0033:0x457569 [ 304.249063] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.267978] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 304.275701] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 304.282979] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 304.290254] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 07:22:01 executing program 2: mprotect(&(0x7f0000051000/0x600000)=nil, 0x600000, 0x6) ptrace$setregs(0xffffffffffffffff, 0x0, 0x80000000, &(0x7f0000000080)="e1") r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xb8d, 0x0) getdents64(r0, &(0x7f0000000180)=""/86, 0x56) socketpair(0x10, 0x7, 0xaf57, &(0x7f0000000280)) connect$nfc_llcp(r0, &(0x7f0000000200)={0x27, 0x0, 0x2, 0x7, 0x9, 0x1cae, "5e059a3194cfec1dc2d627a0c850d36584a5c97d46ae57dcfdf9eb329d988d593dd017972c4a39aadf31014e49279afc0c56716680673c2dad0f871484c1b4", 0x28}, 0x60) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r0}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x420082, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x1, 0x6}, 0x2) mprotect(&(0x7f00000fd000/0x1000)=nil, 0x1000, 0x2000000) 07:22:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:01 executing program 4 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 304.297530] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1f25b0d6d4 [ 304.304806] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:02 executing program 0: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)) r0 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) recvmsg(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000001140)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/150, 0x96}], 0x2, &(0x7f0000001180)=""/36, 0x24, 0x5c82bbc4}, 0x10062) unshare(0xc000001) 07:22:02 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000500)='/dev/video#\x00', 0x5, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000000c0)={0x0, 0x8000, 0x2, {0x2, @win={{}, 0x0, 0x96000, &(0x7f0000000080)={{}, &(0x7f0000000040)}, 0x0, &(0x7f00000000c0)}}}) r1 = semget(0x3, 0x4, 0xa0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000001c0)=""/50) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000300)=""/204) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stack\x00') ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000240)) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xfffffffffffff800) [ 304.471752] FAULT_INJECTION: forcing a failure. [ 304.471752] name failslab, interval 1, probability 0, space 0, times 0 [ 304.532101] CPU: 0 PID: 8172 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 304.538997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.539005] Call Trace: [ 304.539032] dump_stack+0x244/0x39d [ 304.539058] ? dump_stack_print_info.cold.1+0x20/0x20 [ 304.539083] ? smk_access_entry+0x310/0x310 [ 304.554664] ? find_held_lock+0x36/0x1c0 [ 304.554698] should_fail.cold.4+0xa/0x17 [ 304.554717] ? find_held_lock+0x36/0x1c0 [ 304.564228] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.564252] ? lock_downgrade+0x900/0x900 [ 304.564276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.564295] ? timespec64_trunc+0xea/0x180 [ 304.595722] ? inode_init_owner+0x340/0x340 [ 304.600063] ? find_held_lock+0x36/0x1c0 [ 304.604161] ? perf_trace_sched_process_exec+0x860/0x860 [ 304.609624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.615224] __should_failslab+0x124/0x180 [ 304.619480] should_failslab+0x9/0x14 [ 304.623300] kmem_cache_alloc+0x2be/0x730 [ 304.627472] ? do_sys_ftruncate+0x428/0x550 [ 304.631813] ? lock_downgrade+0x900/0x900 [ 304.635973] getname_flags+0xd0/0x590 [ 304.635990] ? __lock_is_held+0xb5/0x140 [ 304.636009] getname+0x19/0x20 [ 304.636025] do_sys_open+0x383/0x700 [ 304.636044] ? filp_open+0x80/0x80 [ 304.647081] ? trace_hardirqs_off_caller+0x310/0x310 [ 304.647097] ? do_sys_ftruncate+0x449/0x550 [ 304.647117] __x64_sys_open+0x7e/0xc0 [ 304.654356] do_syscall_64+0x1b9/0x820 [ 304.654377] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 304.654395] ? syscall_return_slowpath+0x5e0/0x5e0 [ 304.654415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.686613] ? trace_hardirqs_on_caller+0x310/0x310 [ 304.691650] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 304.696691] ? prepare_exit_to_usermode+0x291/0x3b0 [ 304.701735] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.706602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.711803] RIP: 0033:0x4111a1 07:22:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0200000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:02 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @local, 0x2}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x0, @loopback}], 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @local}], 0x1c) epoll_create1(0x80000) 07:22:02 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x2003}) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x2803}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0xfff}, &(0x7f0000000100)=0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f00000001c0)=@ethtool_ringparam={0x11, 0x81, 0x9, 0x10001, 0x101, 0x3f, 0x0, 0x401, 0x20}}) 07:22:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:02 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={"6272696444653000080003a700", &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x280002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r2, 0xb}, 0x10) shutdown(r2, 0x0) r3 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) r4 = getuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r4, r5) [ 304.715008] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 304.733914] RSP: 002b:00007f1f25b0ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 304.741632] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 304.748909] RDX: 00007f1f25b0cafa RSI: 0000000000000002 RDI: 00007f1f25b0caf0 [ 304.756182] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 304.763489] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 304.770769] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 304.875478] EXT4-fs: 21 callbacks suppressed [ 304.875489] EXT4-fs (sda1): Cannot specify journal on remount 07:22:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x500000000000000, @empty=0xffffffffa0008000, [0x0, 0x3e8]}, 0x0) clock_gettime(0x0, &(0x7f0000000240)) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000300), 0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xffff, 0x0, 0x2}, 0x14) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000280), 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x60445606b2f853f5, &(0x7f0000000200)=ANY=[@ANYRESOCT=r3], &(0x7f0000000100)='GPL\x00', 0x0, 0xffffffffffffffbf}, 0x48) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000400)=""/4096) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x28000000eb0000f0, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x728}, 0x28) 07:22:02 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfff, 0x400000) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) socket$nl_generic(0x10, 0x3, 0x10) 07:22:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)) 07:22:02 executing program 4 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:02 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xe38, 0x10c00) accept4$bt_l2cap(r0, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt(r1, 0x541b, &(0x7f0000000100)="93ceb0beb3c0e04fed181c74870273a6980c3eb6d69e8bbef13c8c6fcab110704671e4cea60a89f1f0090a2bef84b134ba332fd7e70bae9808b64b37055d9a5d7768a5d30d5b15e1a99ccc68dbad768b6c7dd830432b757f4ca69454f06f47365469f757ef8a65b9fb6e9e0e56fa3a8d0d46b64f92e9e79405a800feb9a0089e82f80ecb7bfa6209f6cbd08f86872bda2742d060fbb4f49501afaf3b6c852e6e3168b5f86f5f539d92e0b96bf99c8923985d0e8b6e93bf82980ff42b7232bd9d419e7cd6f28ca8b781494f16beb7e85a5e2ef11456e21c3597a3ef034272cd8266fd8782ecee2bced5f25e") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$intptr(0x200000002f, 0x3) [ 305.034023] EXT4-fs (sda1): Cannot specify journal on remount 07:22:02 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x80, 0x0) memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) r0 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000440)="e653394099b6f584169766feda4c07fcfda7a48bc6a56570815688aa76b92f983bb03151d0903a1ab0069aa19169ca387917dd877ad01fd5c796b51fddef95823afe2c3e0b", 0x45, r0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000200), 0x4) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)={'filter\x00'}, &(0x7f00000002c0)=0x54) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101c01, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x9) memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) fstatfs(r1, &(0x7f0000004200)=""/4096) 07:22:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 305.162527] FAULT_INJECTION: forcing a failure. [ 305.162527] name failslab, interval 1, probability 0, space 0, times 0 [ 305.209442] EXT4-fs (sda1): re-mounted. Opts: [ 305.231318] CPU: 1 PID: 8232 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 305.238199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.247590] Call Trace: [ 305.250208] dump_stack+0x244/0x39d [ 305.253872] ? dump_stack_print_info.cold.1+0x20/0x20 [ 305.259089] ? smk_access_entry+0x310/0x310 [ 305.263444] ? find_held_lock+0x36/0x1c0 [ 305.267534] should_fail.cold.4+0xa/0x17 [ 305.271615] ? find_held_lock+0x36/0x1c0 [ 305.275695] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.280819] ? lock_downgrade+0x900/0x900 [ 305.284994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.290547] ? timespec64_trunc+0xea/0x180 [ 305.294795] ? inode_init_owner+0x340/0x340 [ 305.299135] ? find_held_lock+0x36/0x1c0 [ 305.303256] ? ip6_route_multipath_del+0x138/0x530 [ 305.308219] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.313685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.319244] __should_failslab+0x124/0x180 [ 305.319268] should_failslab+0x9/0x14 [ 305.319286] kmem_cache_alloc+0x2be/0x730 [ 305.319309] ? do_sys_ftruncate+0x428/0x550 [ 305.327430] ? lock_downgrade+0x900/0x900 [ 305.327453] getname_flags+0xd0/0x590 [ 305.327468] ? __lock_is_held+0xb5/0x140 [ 305.327486] getname+0x19/0x20 [ 305.327504] do_sys_open+0x383/0x700 [ 305.347946] ? filp_open+0x80/0x80 [ 305.347969] ? trace_hardirqs_off_caller+0x310/0x310 [ 305.347983] ? do_sys_ftruncate+0x449/0x550 [ 305.348004] __x64_sys_open+0x7e/0xc0 [ 305.348026] do_syscall_64+0x1b9/0x820 [ 305.348048] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 07:22:02 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) socket$inet6(0xa, 0x0, 0xff) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x97d, 0x0, @random="a03d24ad0572", 'syzkaller0\x00'}) 07:22:02 executing program 2: getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080), &(0x7f0000000180)=0x20000088) [ 305.380934] ? syscall_return_slowpath+0x5e0/0x5e0 [ 305.385882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.390746] ? trace_hardirqs_on_caller+0x310/0x310 [ 305.395777] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 305.400807] ? prepare_exit_to_usermode+0x291/0x3b0 [ 305.405845] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.410709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.415907] RIP: 0033:0x4111a1 [ 305.419116] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 305.438028] RSP: 002b:00007f1f25b0ca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 305.445750] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 305.453027] RDX: 00007f1f25b0cafa RSI: 0000000000000002 RDI: 00007f1f25b0caf0 [ 305.460304] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.467581] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 305.474858] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 07:22:03 executing program 4 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)) 07:22:03 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x8, 0x0, 0x47}) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000300)='/dev/snd/midiC#D#\x00', 0x7, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@rand_addr, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) [ 305.585909] EXT4-fs (sda1): Cannot specify journal on remount [ 305.697788] FAULT_INJECTION: forcing a failure. [ 305.697788] name failslab, interval 1, probability 0, space 0, times 0 [ 305.736868] EXT4-fs (sda1): re-mounted. Opts: [ 305.753823] CPU: 1 PID: 8262 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 305.760723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.770088] Call Trace: [ 305.772701] dump_stack+0x244/0x39d [ 305.776399] ? dump_stack_print_info.cold.1+0x20/0x20 [ 305.781665] should_fail.cold.4+0xa/0x17 [ 305.785761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.790892] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 305.796458] ? zap_class+0x640/0x640 [ 305.800192] ? lock_acquire+0x1ed/0x520 [ 305.804194] ? lo_ioctl+0x8e/0x1d60 [ 305.807877] ? find_held_lock+0x36/0x1c0 [ 305.811956] ? __lock_is_held+0xb5/0x140 [ 305.816031] ? nft_payload_set_eval+0x1d8/0x1140 [ 305.820815] ? perf_trace_sched_process_exec+0x860/0x860 [ 305.826291] __should_failslab+0x124/0x180 [ 305.830551] should_failslab+0x9/0x14 [ 305.834368] kmem_cache_alloc_trace+0x2d7/0x750 [ 305.839059] ? check_preemption_disabled+0x48/0x280 [ 305.844104] __kthread_create_on_node+0x137/0x540 [ 305.848968] ? loop_get_status64+0x140/0x140 [ 305.853391] ? kthread_parkme+0xb0/0xb0 [ 305.857435] ? __lockdep_init_map+0x105/0x590 [ 305.861973] ? __lockdep_init_map+0x105/0x590 [ 305.866488] ? loop_get_status64+0x140/0x140 [ 305.870914] kthread_create_on_node+0xb1/0xe0 [ 305.875435] ? __kthread_create_on_node+0x540/0x540 [ 305.880473] ? kasan_check_read+0x11/0x20 [ 305.884645] lo_ioctl+0x7f6/0x1d60 [ 305.888210] ? lo_rw_aio+0x1ef0/0x1ef0 [ 305.892113] blkdev_ioctl+0x98e/0x21b0 [ 305.896016] ? blkpg_ioctl+0xc10/0xc10 [ 305.899917] ? lock_downgrade+0x900/0x900 [ 305.904096] ? check_preemption_disabled+0x48/0x280 [ 305.909130] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 305.914076] ? kasan_check_read+0x11/0x20 [ 305.918242] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 305.923530] ? rcu_softirq_qs+0x20/0x20 [ 305.927526] ? __fget+0x4d1/0x740 [ 305.931005] ? ksys_dup3+0x680/0x680 [ 305.934744] block_ioctl+0xee/0x130 [ 305.934761] ? blkdev_fallocate+0x400/0x400 [ 305.934780] do_vfs_ioctl+0x1de/0x1720 [ 305.934803] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 07:22:03 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getsockopt$inet_tcp_int(r1, 0x6, 0x15, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) setpriority(0x2, r2, 0x5) [ 305.934823] ? ioctl_preallocate+0x300/0x300 [ 305.934837] ? memset+0x31/0x40 [ 305.934856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.934882] ? smack_file_ioctl+0x210/0x3c0 [ 305.965450] ? fget_raw+0x20/0x20 [ 305.965474] ? smack_file_lock+0x2e0/0x2e0 [ 305.965493] ? rcu_read_lock_sched_held+0x14f/0x180 [ 305.965520] ? do_syscall_64+0x9a/0x820 [ 305.965536] ? do_syscall_64+0x9a/0x820 [ 305.965560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.996115] ? security_file_ioctl+0x94/0xc0 [ 306.000549] ksys_ioctl+0xa9/0xd0 [ 306.004025] __x64_sys_ioctl+0x73/0xb0 [ 306.004047] do_syscall_64+0x1b9/0x820 [ 306.004067] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 306.004087] ? syscall_return_slowpath+0x5e0/0x5e0 [ 306.011855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.011875] ? trace_hardirqs_on_caller+0x310/0x310 [ 306.011892] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 306.011908] ? prepare_exit_to_usermode+0x291/0x3b0 [ 306.011928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.011953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.011966] RIP: 0033:0x4573d7 [ 306.011985] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.074198] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.081921] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 306.089201] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.096480] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 306.103761] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 306.111042] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 07:22:03 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)="00d6262292fd1c705022f0000600000000000000", 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0xcd}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r2, 0x8}, 0x8) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000800000000001a0004000000402473915e00002000000000000000000000"], 0x2b) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) r3 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000200)=0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000380)) getpgid(r4) llistxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/46, 0x2e) 07:22:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)) 07:22:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0600004973092b1d493c6f343d00000000001718a28d8fa37382e4100739ee463b185c2edf91d443a9ad955f7509c741a1332797000b0a05c33629f679ae10f2f773c5d5e0cb0efcc5932c0e4265b5b7f0d38f99872f9f08323266d6ea32b4ca54fe1c2c429e06c610a9b91dc3e7c85c96e5e00171730a2d569321c57ebb5ebde37e59fa630fd42540f39b4f585516680ebbf60ab812e7f037be5067a8df20cb49f995dfac228b67f7ef432797e1b08fc0fa20bfc327237fecc1a9bc1dc2232734afb3f7bd9a88b2122b4a65222df3c878ea63a5c2188f3b95d9331bc51512804451c5603612b6792a1ebb5eaa00c5bca5c0ff6f417b1fb0"]}) close(r2) close(r1) 07:22:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) rt_sigreturn() clock_adjtime(0x1, &(0x7f0000000000)={0x1, 0x9, 0x8, 0xd5, 0x9, 0x9, 0xff, 0x0, 0x8, 0x80, 0xdc0, 0x90000, 0x9, 0x3, 0x14000000000000, 0x1f, 0x5, 0x3ff, 0xac, 0x7fff, 0x3, 0x2, 0x5, 0x3, 0x6c9, 0x5}) socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000280)) setsockopt$inet6_buf(r0, 0x29, 0x80000000000012, &(0x7f0000000080), 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000140)={0x1, [0xffffffff]}) [ 306.302649] EXT4-fs (sda1): Cannot specify journal on remount 07:22:03 executing program 4 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 306.450938] EXT4-fs (sda1): re-mounted. Opts: 07:22:04 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) socket$inet6(0xa, 0x0, 0xff) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x0, 0x97d, 0x0, @random="a03d24ad0572", 'syzkaller0\x00'}) 07:22:04 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8901, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3f000000]}}) socket$nl_generic(0x10, 0x3, 0x10) 07:22:04 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101000, 0x19c) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000080)={@multicast1, @rand_addr=0x100000001}, 0xc) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000000)={0x0, 0x2000000001, 0x0, &(0x7f0000000300)}) [ 306.556045] EXT4-fs (sda1): Cannot specify journal on remount 07:22:04 executing program 1 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 306.602848] FAULT_INJECTION: forcing a failure. [ 306.602848] name failslab, interval 1, probability 0, space 0, times 0 07:22:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:04 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000180), &(0x7f0000000100)=0x6) [ 306.646349] FAULT_INJECTION: forcing a failure. [ 306.646349] name failslab, interval 1, probability 0, space 0, times 0 [ 306.663615] CPU: 0 PID: 8327 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 306.670504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.679861] Call Trace: [ 306.679890] dump_stack+0x244/0x39d [ 306.679915] ? dump_stack_print_info.cold.1+0x20/0x20 [ 306.679952] should_fail.cold.4+0xa/0x17 [ 306.695388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 306.700519] ? down_write_nested+0x130/0x130 [ 306.704943] ? down_read+0x120/0x120 [ 306.708679] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 306.714240] ? zap_class+0x640/0x640 [ 306.714257] ? lock_acquire+0x1ed/0x520 [ 306.714277] ? lo_ioctl+0x8e/0x1d60 [ 306.714301] ? find_held_lock+0x36/0x1c0 [ 306.714323] ? __lock_is_held+0xb5/0x140 [ 306.714356] ? perf_trace_sched_process_exec+0x860/0x860 [ 306.739210] __should_failslab+0x124/0x180 [ 306.743471] should_failslab+0x9/0x14 [ 306.747286] kmem_cache_alloc_trace+0x2d7/0x750 [ 306.751977] ? check_preemption_disabled+0x48/0x280 [ 306.757037] __kthread_create_on_node+0x137/0x540 [ 306.761902] ? loop_get_status64+0x140/0x140 [ 306.766327] ? kthread_parkme+0xb0/0xb0 [ 306.770338] ? __lockdep_init_map+0x105/0x590 [ 306.774851] ? __lockdep_init_map+0x105/0x590 [ 306.779365] ? loop_get_status64+0x140/0x140 [ 306.783790] kthread_create_on_node+0xb1/0xe0 [ 306.788299] ? __kthread_create_on_node+0x540/0x540 [ 306.793332] ? kasan_check_read+0x11/0x20 [ 306.797504] lo_ioctl+0x7f6/0x1d60 [ 306.801066] ? lo_rw_aio+0x1ef0/0x1ef0 [ 306.804985] blkdev_ioctl+0x98e/0x21b0 [ 306.808893] ? blkpg_ioctl+0xc10/0xc10 [ 306.812794] ? lock_downgrade+0x900/0x900 [ 306.816954] ? check_preemption_disabled+0x48/0x280 [ 306.821986] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 306.826927] ? kasan_check_read+0x11/0x20 [ 306.831089] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 306.836379] ? rcu_softirq_qs+0x20/0x20 [ 306.840378] ? __fget+0x4d1/0x740 [ 306.843851] ? ksys_dup3+0x680/0x680 [ 306.847591] block_ioctl+0xee/0x130 [ 306.851231] ? blkdev_fallocate+0x400/0x400 [ 306.855571] do_vfs_ioctl+0x1de/0x1720 [ 306.859478] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 306.865030] ? ioctl_preallocate+0x300/0x300 [ 306.869463] ? memset+0x31/0x40 [ 306.872760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.878319] ? smack_file_ioctl+0x210/0x3c0 [ 306.882651] ? fget_raw+0x20/0x20 [ 306.886124] ? smack_file_lock+0x2e0/0x2e0 [ 306.890382] ? rcu_read_lock_sched_held+0x14f/0x180 [ 306.895441] ? do_syscall_64+0x9a/0x820 [ 306.899438] ? do_syscall_64+0x9a/0x820 [ 306.903442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.908992] ? security_file_ioctl+0x94/0xc0 [ 306.913419] ksys_ioctl+0xa9/0xd0 [ 306.916902] __x64_sys_ioctl+0x73/0xb0 [ 306.920802] do_syscall_64+0x1b9/0x820 [ 306.924712] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 306.930088] ? syscall_return_slowpath+0x5e0/0x5e0 [ 306.935026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.939883] ? trace_hardirqs_on_caller+0x310/0x310 [ 306.944910] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 306.949937] ? prepare_exit_to_usermode+0x291/0x3b0 [ 306.954994] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.959858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.965059] RIP: 0033:0x4573d7 [ 306.968265] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.987176] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.994892] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 307.002165] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.009444] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 307.016720] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 307.023995] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 307.031300] CPU: 1 PID: 8335 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 307.038164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.047543] Call Trace: [ 307.050152] dump_stack+0x244/0x39d [ 307.053809] ? dump_stack_print_info.cold.1+0x20/0x20 [ 307.059018] ? lock_downgrade+0x900/0x900 [ 307.063201] should_fail.cold.4+0xa/0x17 [ 307.067286] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.072410] ? lock_downgrade+0x900/0x900 [ 307.076584] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.082155] ? proc_fail_nth_write+0x9e/0x210 [ 307.086679] ? proc_cwd_link+0x1d0/0x1d0 [ 307.090768] ? find_held_lock+0x36/0x1c0 07:22:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x52e, 0x80000) ioctl$FICLONE(r1, 0x40049409, r2) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={r2, 0x0, 0xffff, 0x0, 0x7}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x16, "ed1efcf45c5a10cde578e0f4b1d1769892fd96c9b3d8"}, &(0x7f00000000c0)=0x1e) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r3, 0x4, 0x3, 0x7}, 0x10) [ 307.094857] ? perf_trace_applptr+0x188/0xd00 [ 307.099385] ? perf_trace_sched_process_exec+0x860/0x860 [ 307.104868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.110441] __should_failslab+0x124/0x180 [ 307.114699] should_failslab+0x9/0x14 [ 307.118521] __kmalloc+0x2e0/0x760 [ 307.122083] ? strncpy_from_user+0x5a0/0x5a0 [ 307.126506] ? fput+0x130/0x1a0 [ 307.129791] ? do_syscall_64+0x9a/0x820 [ 307.133766] ? __x64_sys_memfd_create+0x142/0x4f0 [ 307.138610] ? do_syscall_64+0x9a/0x820 [ 307.142596] __x64_sys_memfd_create+0x142/0x4f0 [ 307.147273] ? memfd_fcntl+0x1910/0x1910 [ 307.151352] do_syscall_64+0x1b9/0x820 [ 307.155250] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.160621] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.165555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.170405] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.175446] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.180471] ? prepare_exit_to_usermode+0x291/0x3b0 [ 307.185499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.190353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.195543] RIP: 0033:0x457569 [ 307.198742] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.217659] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 307.225371] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 307.232643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 307.239910] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 307.247188] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f70449b26d4 [ 307.254461] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:04 executing program 4 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)='procselfmd5sum:eth0eth1#}wlan0.-\\cpuset\x00', 0x28, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6c, 0x0, @dev, @remote, {[@rr={0x44, 0x3}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000000)) 07:22:04 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xec, 0x0, {"5a27ba4f8dff696f5d8c598c12b881044ba9e5ed256a233837dca7efc438fceb41de0f1f10d491658cc4d48d9b9404aa753d465c42d7bd376fbda353d6a04e20e746cdb2595bab8ca34b4d0aed8b450ab7a851aaefe6ab0fed2c47fcdaaf4911bcc33c6da90376712f1715078e68df7eecfbb71012748adf906d7d36c78317466b5cdd4f5f69e6c3a52fc6674d7c958871b2bcd583144d9fdbfe601e8f7fd6c73653d57fbe3f79c08fec9450db6f90febdd0dd04f5a6c699e66aa7271d038b68bcae7ea0f8b3cc960216a730da20b20f95d5177e"}}}, &(0x7f0000000580)=""/111, 0xee, 0x6f, 0x1}, 0x20) r0 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000680)=""/134) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) r2 = dup(r1) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000001780)=ANY=[@ANYRES32], 0x1, 0x2) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3, 0x9, 0x800, 0x100000000, 0x1ff}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r4, 0x101}, &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) connect$pppoe(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x0, {0x2, @broadcast, 'nr0\x00'}}, 0x1e) mount$9p_rdma(&(0x7f0000001980)='127.0.0.1\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000001a00)='9p\x00', 0x0, &(0x7f0000001a40)=ANY=[@ANYRESDEC]) clone(0x1100000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001880)={0x0, 0x70, 0x2, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, 0x10000, 0x51aa, 0x0, 0xfffffffffffffffd, 0x0, 0xffff, 0x8, 0x8, 0xecf2, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xa3fe, 0x1, 0xd7, 0x0, 0x0, 0x3, 0xfe6, 0x7, 0x1, 0x101, 0x1000, 0x5, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x40, 0x3cf}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 07:22:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227c, &(0x7f0000000200)) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x103200) 07:22:04 executing program 1 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 307.416696] EXT4-fs (sda1): Cannot specify journal on remount [ 307.454834] FAULT_INJECTION: forcing a failure. [ 307.454834] name failslab, interval 1, probability 0, space 0, times 0 [ 307.471152] CPU: 1 PID: 8365 Comm: syz-executor4 Not tainted 4.19.0+ #87 [ 307.478028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.487386] Call Trace: [ 307.489993] dump_stack+0x244/0x39d [ 307.493644] ? dump_stack_print_info.cold.1+0x20/0x20 [ 307.498860] ? cpuacct_charge+0x265/0x440 [ 307.503037] should_fail.cold.4+0xa/0x17 [ 307.507112] ? __lock_is_held+0xb5/0x140 [ 307.511198] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.516318] ? lock_downgrade+0x900/0x900 [ 307.520480] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 307.525433] ? kasan_check_read+0x11/0x20 [ 307.529598] ? zap_class+0x640/0x640 [ 307.533322] ? rcu_softirq_qs+0x20/0x20 [ 307.537311] ? print_usage_bug+0xc0/0xc0 [ 307.541628] ? find_held_lock+0x36/0x1c0 [ 307.545710] ? __lock_is_held+0xb5/0x140 [ 307.549799] ? reweight_entity+0x10f0/0x10f0 [ 307.554230] ? perf_trace_sched_process_exec+0x860/0x860 [ 307.559706] __should_failslab+0x124/0x180 [ 307.563963] should_failslab+0x9/0x14 [ 307.567780] kmem_cache_alloc+0x2be/0x730 [ 307.571949] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 307.576004] FAULT_INJECTION: forcing a failure. [ 307.576004] name failslab, interval 1, probability 0, space 0, times 0 [ 307.576987] __kernfs_new_node+0x127/0x8d0 [ 307.577009] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 307.577042] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 307.577072] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 307.607415] ? zap_class+0x640/0x640 [ 307.611148] ? print_usage_bug+0xc0/0xc0 [ 307.615228] ? zap_class+0x640/0x640 [ 307.618952] ? enqueue_task_fair+0x24d/0xa50 [ 307.623389] ? find_held_lock+0x36/0x1c0 [ 307.627483] kernfs_new_node+0x95/0x120 [ 307.631476] kernfs_create_dir_ns+0x4d/0x160 [ 307.635901] internal_create_group+0x5fc/0xd80 [ 307.640508] ? remove_files.isra.1+0x190/0x190 [ 307.645095] ? up_write+0x7b/0x220 [ 307.648646] ? down_write_nested+0x130/0x130 [ 307.653063] ? down_read+0x120/0x120 [ 307.656804] sysfs_create_group+0x1f/0x30 [ 307.660972] lo_ioctl+0x1307/0x1d60 [ 307.664628] ? lo_rw_aio+0x1ef0/0x1ef0 [ 307.668528] blkdev_ioctl+0x98e/0x21b0 [ 307.672927] ? blkpg_ioctl+0xc10/0xc10 [ 307.676821] ? lock_downgrade+0x900/0x900 [ 307.680981] ? check_preemption_disabled+0x48/0x280 [ 307.686022] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 307.690963] ? kasan_check_read+0x11/0x20 [ 307.695117] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 307.700770] ? rcu_softirq_qs+0x20/0x20 [ 307.704771] ? __fget+0x4d1/0x740 [ 307.708241] ? ksys_dup3+0x680/0x680 [ 307.711977] block_ioctl+0xee/0x130 [ 307.715615] ? blkdev_fallocate+0x400/0x400 [ 307.719951] do_vfs_ioctl+0x1de/0x1720 [ 307.723855] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 307.729404] ? ioctl_preallocate+0x300/0x300 [ 307.733830] ? memset+0x31/0x40 [ 307.737128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.742677] ? smack_file_ioctl+0x210/0x3c0 [ 307.747004] ? fget_raw+0x20/0x20 [ 307.750466] ? smack_file_lock+0x2e0/0x2e0 [ 307.754713] ? rcu_read_lock_sched_held+0x14f/0x180 [ 307.759751] ? do_syscall_64+0x9a/0x820 [ 307.763741] ? do_syscall_64+0x9a/0x820 [ 307.767728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.773277] ? security_file_ioctl+0x94/0xc0 [ 307.777700] ksys_ioctl+0xa9/0xd0 [ 307.781167] __x64_sys_ioctl+0x73/0xb0 [ 307.785074] do_syscall_64+0x1b9/0x820 [ 307.788978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 307.794353] ? syscall_return_slowpath+0x5e0/0x5e0 [ 307.799291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.804149] ? trace_hardirqs_on_caller+0x310/0x310 [ 307.809191] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 307.814223] ? prepare_exit_to_usermode+0x291/0x3b0 07:22:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @rand_addr=0x80000001}, 0x10) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) [ 307.819254] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.824119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.829323] RIP: 0033:0x4573d7 [ 307.832528] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.851443] RSP: 002b:00007f1f25b0ca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.859162] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 07:22:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000180)) read(r0, &(0x7f0000009f9c)=""/100, 0x64) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}) r1 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) readv(r1, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0x10024}], 0x4e8) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={"626f6e645f736c6176655f3000000002", {0x2, 0x0, @local, [0x8a02]}}) pkey_alloc(0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000080)=0x80000001) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x800, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000140)=0xfffffffffffffed1) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) [ 307.866466] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.873743] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 307.873758] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 307.888300] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 307.902563] 9pnet_virtio: no channels available for device 127.0.0.1 [ 307.934158] EXT4-fs (sda1): Cannot specify journal on remount [ 307.939091] CPU: 1 PID: 8378 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 307.946936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.946943] Call Trace: [ 307.946969] dump_stack+0x244/0x39d [ 307.946990] ? dump_stack_print_info.cold.1+0x20/0x20 [ 307.947020] should_fail.cold.4+0xa/0x17 [ 307.967740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 307.967764] ? find_held_lock+0x36/0x1c0 [ 307.967789] ? zap_class+0x640/0x640 [ 307.967806] ? __lock_acquire+0x62f/0x4c20 [ 307.967828] ? lock_downgrade+0x900/0x900 [ 307.993110] ? check_preemption_disabled+0x48/0x280 [ 307.998151] ? find_held_lock+0x36/0x1c0 [ 308.002274] ? expand_files.part.8+0x571/0x9a0 [ 308.006874] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.012342] ? find_held_lock+0x36/0x1c0 [ 308.012368] __should_failslab+0x124/0x180 [ 308.012392] should_failslab+0x9/0x14 [ 308.012410] kmem_cache_alloc+0x2be/0x730 [ 308.012446] ? shmem_destroy_callback+0xc0/0xc0 [ 308.012464] shmem_alloc_inode+0x1b/0x40 [ 308.012478] alloc_inode+0x63/0x190 [ 308.012494] new_inode_pseudo+0x71/0x1a0 [ 308.012512] ? prune_icache_sb+0x1c0/0x1c0 [ 308.020811] ? _raw_spin_unlock+0x2c/0x50 [ 308.020833] new_inode+0x1c/0x40 [ 308.020851] shmem_get_inode+0xf1/0x920 [ 308.020872] ? shmem_encode_fh+0x340/0x340 [ 308.020891] ? lock_downgrade+0x900/0x900 [ 308.069273] ? lock_release+0xa00/0xa00 [ 308.073262] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.078734] ? usercopy_warn+0x110/0x110 [ 308.082828] __shmem_file_setup.part.50+0x83/0x2a0 [ 308.087784] shmem_file_setup+0x65/0x90 [ 308.091778] __x64_sys_memfd_create+0x2af/0x4f0 [ 308.096472] ? memfd_fcntl+0x1910/0x1910 [ 308.100560] do_syscall_64+0x1b9/0x820 [ 308.104475] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.109856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.114798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.119656] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.124693] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.129728] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.134768] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.139650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.144852] RIP: 0033:0x457569 [ 308.148060] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.166977] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 308.174699] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 07:22:05 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000040)) clone(0x2, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000480)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 07:22:05 executing program 1 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 308.181975] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 308.189245] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 308.196507] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f70449b26d4 [ 308.203769] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0018000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000180)) read(r0, &(0x7f0000009f9c)=""/100, 0x64) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}) r1 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) readv(r1, &(0x7f000085dff0)=[{&(0x7f0000e94000)=""/62, 0x10024}], 0x4e8) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={"626f6e645f736c6176655f3000000002", {0x2, 0x0, @local, [0x8a02]}}) pkey_alloc(0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f0000000080)=0x80000001) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x800, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000140)=0xfffffffffffffed1) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) [ 308.412413] FAULT_INJECTION: forcing a failure. [ 308.412413] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.424289] CPU: 0 PID: 8405 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 308.431142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.440501] Call Trace: [ 308.443110] dump_stack+0x244/0x39d [ 308.446765] ? dump_stack_print_info.cold.1+0x20/0x20 [ 308.451972] ? zap_class+0x640/0x640 [ 308.455708] ? print_usage_bug+0xc0/0xc0 [ 308.459793] should_fail.cold.4+0xa/0x17 [ 308.463872] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 308.468988] ? find_held_lock+0x36/0x1c0 [ 308.473076] ? get_mem_cgroup_from_mm.part.62+0x204/0x880 [ 308.478634] ? lock_downgrade+0x900/0x900 [ 308.482800] ? check_preemption_disabled+0x48/0x280 [ 308.487830] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 308.492773] ? kasan_check_read+0x11/0x20 [ 308.496936] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 308.502228] ? zap_class+0x640/0x640 [ 308.505951] ? rcu_softirq_qs+0x20/0x20 [ 308.509973] ? rcu_read_unlock+0x16/0x60 [ 308.514054] __alloc_pages_nodemask+0x34b/0xde0 [ 308.518738] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 308.523689] ? kasan_check_read+0x11/0x20 [ 308.527852] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 308.532873] ? __lock_is_held+0xb5/0x140 [ 308.536962] ? rcu_read_unlock+0x33/0x60 [ 308.541254] ? trace_hardirqs_off+0xb8/0x310 [ 308.545689] cache_grow_begin+0xa5/0x8c0 [ 308.549770] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.555328] ? check_preemption_disabled+0x48/0x280 [ 308.560368] kmem_cache_alloc+0x66b/0x730 [ 308.564540] ? shmem_destroy_callback+0xc0/0xc0 [ 308.569225] shmem_alloc_inode+0x1b/0x40 [ 308.573296] alloc_inode+0x63/0x190 [ 308.576939] new_inode_pseudo+0x71/0x1a0 [ 308.581019] ? prune_icache_sb+0x1c0/0x1c0 [ 308.585275] ? _raw_spin_unlock+0x2c/0x50 [ 308.589447] new_inode+0x1c/0x40 [ 308.592835] shmem_get_inode+0xf1/0x920 [ 308.596833] ? shmem_encode_fh+0x340/0x340 [ 308.601087] ? lock_downgrade+0x900/0x900 [ 308.605256] ? lock_release+0xa00/0xa00 07:22:06 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000040)) clone(0x2, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000480)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) [ 308.609242] ? perf_trace_sched_process_exec+0x860/0x860 [ 308.614714] ? usercopy_warn+0x110/0x110 [ 308.618805] __shmem_file_setup.part.50+0x83/0x2a0 [ 308.623829] shmem_file_setup+0x65/0x90 [ 308.627813] __x64_sys_memfd_create+0x2af/0x4f0 [ 308.632481] ? memfd_fcntl+0x1910/0x1910 [ 308.636556] do_syscall_64+0x1b9/0x820 [ 308.640446] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 308.645819] ? syscall_return_slowpath+0x5e0/0x5e0 [ 308.650737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.655574] ? trace_hardirqs_on_caller+0x310/0x310 [ 308.660590] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 308.665609] ? prepare_exit_to_usermode+0x291/0x3b0 [ 308.670632] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.675482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.680658] RIP: 0033:0x457569 [ 308.683847] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.702734] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 07:22:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x2f8}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000340)) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000040)="6113ae1a74718103ba610a91cdaa882baa3e97dffd17405d343d64bcd25916a2d80b176daf3f8d8718484e05382943972c539562ac17ea942908bc87001d5b34e22a0f9b0e6cf86e90c7414c6bb054e45cdcdc4cd0ce0ece3a6d786c2272d6d6731870a53199a3b71c6fdeab0967be9909576e1017c8a3") connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x1, @remote, 'veth1_to_team\x00'}}, 0x1e) [ 308.710437] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 308.717697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 308.724952] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 308.732233] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f70449b26d4 [ 308.739504] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000008000f0fffeffe809000000fff5dd00000010000100070aa8f7410400000000fcff", 0x58}], 0x1) 07:22:06 executing program 1 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:06 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x5, 0x79, 0x3, 0x10001, 0x492498d, [{0x80000000, 0xff, 0x0, 0x0, 0x0, 0x200}]}) r3 = dup3(r1, r1, 0x80000) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000000)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_crypto(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000404}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x110}}, 0x804) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000180)={0x8001, 0x27, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000040)=0x3) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f00000001c0)=0x9) 07:22:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7a00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:06 executing program 0: prctl$intptr(0x21, 0x1) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x400) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2478}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000000c0)={r1, 0x1ba1, 0x80, "0b227a3891b00b4f9b79b970e6d4e4dd6bbbc84226fa9dcd9cc8cb61b719c468ce7b13c53cb358970d0a4f4add38fee0ce3ec68020e6a4a89894ba32e5c7027fa759ad253e35afd7c700afaac39d8ad3cb6d106183fcc7a7ff9c3918bd6c4630b1056d01fc37c4b391b82f422519e96003b74b1939d9c0d72c17d2df4c54cb20"}, 0x88) [ 308.982521] FAULT_INJECTION: forcing a failure. [ 308.982521] name failslab, interval 1, probability 0, space 0, times 0 [ 309.038712] ion_buffer_destroy: buffer still mapped in the kernel [ 309.077135] CPU: 1 PID: 8438 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 309.084040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.093403] Call Trace: [ 309.096022] dump_stack+0x244/0x39d [ 309.099674] ? dump_stack_print_info.cold.1+0x20/0x20 [ 309.104898] should_fail.cold.4+0xa/0x17 [ 309.108982] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.114101] ? __kernel_text_address+0xd/0x40 [ 309.118614] ? unwind_get_return_address+0x61/0xa0 [ 309.123565] ? __lockdep_init_map+0x105/0x590 [ 309.128081] ? lockdep_init_map+0x9/0x10 [ 309.132155] ? debug_mutex_init+0x2d/0x60 [ 309.136330] ? find_held_lock+0x36/0x1c0 [ 309.140440] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.145919] __should_failslab+0x124/0x180 [ 309.150170] should_failslab+0x9/0x14 [ 309.153993] kmem_cache_alloc+0x2be/0x730 [ 309.158162] ? mpol_shared_policy_init+0x235/0x650 [ 309.163114] ? current_time+0x72/0x1b0 [ 309.167016] __d_alloc+0xc8/0xb90 [ 309.170488] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 309.175520] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 309.180553] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 309.185750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.185765] ? timespec64_trunc+0xea/0x180 [ 309.185779] ? inode_init_owner+0x340/0x340 [ 309.185800] ? _raw_spin_unlock+0x2c/0x50 [ 309.185818] ? current_time+0x131/0x1b0 [ 309.185833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.185849] ? __lockdep_init_map+0x105/0x590 [ 309.185870] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 309.185889] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 309.229218] d_alloc_pseudo+0x1d/0x30 [ 309.233043] alloc_file_pseudo+0x158/0x3f0 [ 309.237298] ? alloc_file+0x4d0/0x4d0 [ 309.237320] ? usercopy_warn+0x110/0x110 [ 309.237352] __shmem_file_setup.part.50+0x110/0x2a0 [ 309.245211] shmem_file_setup+0x65/0x90 [ 309.245231] __x64_sys_memfd_create+0x2af/0x4f0 [ 309.245248] ? memfd_fcntl+0x1910/0x1910 [ 309.245276] do_syscall_64+0x1b9/0x820 [ 309.266832] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.266853] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.266868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.266889] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.287026] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.292055] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.292079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.292104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.292116] RIP: 0033:0x457569 [ 309.292132] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.292141] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 07:22:06 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000040)) clone(0x2, &(0x7f0000000380), &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000480)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 07:22:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f6ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:06 executing program 0: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)=' \x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x5, 0x2}) mq_notify(r0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x40) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000080)) 07:22:06 executing program 2: pipe(&(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x2, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r2) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0x7, 0x47b, r1, &(0x7f0000000980)="a29be28ac8bc949b527b1a32db4a4917b908b6fb457b18ec4baa13ae9cd2402c2915f04bec2a01c17645b7b24b74a4b49fe0fae9bd53cb242ba4fc27f6c6c23767a7cd9431870c4a605fab3f23ef8017831dee45f1ed3ac7aa524ad80d509a13d32e2282611ecc688a2aa31675cbccfa7e9deef9a503b771c810a6ce5c46c74d43668052222714dfb5b442f710ba37f9e0ef167394f4dcd794648aa032bc5418823884f77dd8a62b391076dcbcc849215e3fbb7d2002b266ba9371", 0xbb, 0x3a6b, 0x0, 0x3, r0}]) read(r0, &(0x7f0000000200)=""/250, 0x78000) [ 309.337015] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 309.344294] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 309.351578] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 309.358859] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f70449b26d4 [ 309.366133] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:06 executing program 1 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 309.562661] FAULT_INJECTION: forcing a failure. [ 309.562661] name failslab, interval 1, probability 0, space 0, times 0 [ 309.612368] CPU: 0 PID: 8477 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 309.619274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.628641] Call Trace: [ 309.631248] dump_stack+0x244/0x39d [ 309.634904] ? dump_stack_print_info.cold.1+0x20/0x20 [ 309.640114] ? __save_stack_trace+0x8d/0xf0 [ 309.644478] should_fail.cold.4+0xa/0x17 [ 309.648561] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.653688] ? smack_d_instantiate+0x136/0xea0 [ 309.658289] ? save_stack+0x43/0xd0 [ 309.661928] ? kasan_kmalloc+0xc7/0xe0 [ 309.665842] ? find_held_lock+0x36/0x1c0 [ 309.669924] ? zap_class+0x640/0x640 [ 309.673800] ? find_held_lock+0x36/0x1c0 [ 309.677884] ? btrfs_end_write_no_snapshotting+0x48/0x200 [ 309.683465] ? perf_trace_sched_process_exec+0x860/0x860 [ 309.688940] ? lock_downgrade+0x900/0x900 [ 309.693115] __should_failslab+0x124/0x180 [ 309.697365] should_failslab+0x9/0x14 [ 309.701720] kmem_cache_alloc+0x2be/0x730 [ 309.705880] ? d_set_d_op+0x31d/0x410 [ 309.709709] __alloc_file+0xa8/0x470 [ 309.713444] ? file_free_rcu+0xd0/0xd0 [ 309.717345] ? d_instantiate+0x79/0xa0 [ 309.721278] ? lock_downgrade+0x900/0x900 [ 309.725439] ? kasan_check_read+0x11/0x20 [ 309.729589] ? do_raw_spin_unlock+0xa7/0x330 [ 309.734010] ? do_raw_spin_trylock+0x270/0x270 [ 309.738622] alloc_empty_file+0x72/0x170 [ 309.742709] alloc_file+0x5e/0x4d0 [ 309.746265] ? _raw_spin_unlock+0x2c/0x50 [ 309.750442] alloc_file_pseudo+0x261/0x3f0 [ 309.754703] ? alloc_file+0x4d0/0x4d0 [ 309.758524] ? usercopy_warn+0x110/0x110 [ 309.762613] __shmem_file_setup.part.50+0x110/0x2a0 [ 309.767650] shmem_file_setup+0x65/0x90 [ 309.771648] __x64_sys_memfd_create+0x2af/0x4f0 [ 309.776342] ? memfd_fcntl+0x1910/0x1910 [ 309.780449] do_syscall_64+0x1b9/0x820 [ 309.784359] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.789740] ? syscall_return_slowpath+0x5e0/0x5e0 [ 309.794709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.799546] ? trace_hardirqs_on_caller+0x310/0x310 [ 309.804552] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 309.809568] ? prepare_exit_to_usermode+0x291/0x3b0 [ 309.814587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.819429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.824605] RIP: 0033:0x457569 [ 309.827786] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.846674] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 309.854380] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 07:22:07 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) sendmmsg(r0, &(0x7f0000005480)=[{{&(0x7f0000000100)=@sco={0x1f, {0x5, 0x57e, 0x5, 0x5c, 0xffff, 0x100000000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000240)="3313e49fb5b9c2ddcf5c7edb2b7f7599b45b55fa1b7988d2ced7f5e1e34889bac16ecae056264cd5819345679690b370ace240f9d6fefa8a1a7519844d9634cf4578a073cd88429bb115fb16dca942bb87219a90ab2651b74580c2bac1036446ce78ef280354c7228f3b7a8f2a22067fcdcdf4a6cb955b0ae459adc3c73082c523ce01bd", 0x84}], 0x1}, 0x7f}, {{&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x1, 0x2, 0x0, 0x2}}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000380)="6dcd8a59efd6", 0x6}, {&(0x7f00000003c0)="5558bbe75e2d9ae17e2ed061cf1fa0071c626e367a30f2276e460c1f5b8efef968a4e7c203d21af9ad906f23", 0x2c}, {&(0x7f0000000400)="7a78d86b358a4b", 0x7}, {&(0x7f0000000440)="317c50a7196d4d588d9bd17ea90c27d3f5980000f7a26dac1dea93313678e694fab7fb2bb7cbb997a325f66e16f90b030233698bce8b8aa3e3098de1809a8e58b39e89221f0e0851427f9587a851432adb7b85a86a135ad2869c93e194fa20274e0b05471088e21b68e7cc5329c865eafb67d03e3cbca57ceb399afd4f3a6ddb1507d3e654783bd1609c8771a462f9d0640e6cdcf52fbc52275b782fdf5d5e2853856769ed3a2bfcb3d01ff30dc954b5029c9804dbec1fec03223ce729442163db22e4d90319ab997f3aa1ec4b0f904098f869515970d5d454f4f5ff1c9ae01130333d62cb5664baae", 0xe9}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="1f378e256bce56cd2d06783223bfc064787c932ff18979", 0x17}, {&(0x7f0000001580)="d4cef1cf8dbee0736fb37ab819e8444c94085ba7398b9fbbdf66da5cb602f009e4b7a910273e12c6c629088df751963d32a442ffe3a0e2e709f6badd68a3d3bf26ab5986bae3ef2d7fa85878e04de516f1fa5bc9ce10531ac6093dfa41a5c547d5e5b5a67cbb4ad3635b93ee33872a33cc2fa1737d21db8202ed27a476d364b6503c0137769d5a0b1cc968ff14c0779b9cca2aaafb99d11b8e5b1e46dcddf58ffbd3235f9142da7dc3ab47cfeb2bb3799aa3c8eb9af4ff204529821306ed6031db91d3d6644abb680933cc12ee9be4c97fa02f554c3eec84041b889c49905913113c", 0xe2}, {&(0x7f0000001680)="892bd1bd42de73928641ee19e99e1ab77d7827029e408add64a281eb672e1f7844e2775dc6874a737fad6dc5872a4cdb0573c8b9b899e7db5393179e07b1ef2dcfcaad7a35af5fb24a414df9bd0e42ec4271cff7c5c7ef8a70b818219c0680c8de21992acdd00a40c570eba2f1f267cdb85c5ac8721ece96798a11a0da9e57d7363c4bb937847254b15c742194166ecaf2450705f56ab6d72fa07d87de66f1a4db00aabc4c41b1630a365f36b7abc6408e53da8ceb71b3b0706d1fe16bf24d6a8ad37694fd7af275372dad77cd8977b3391d9d", 0xd3}, {&(0x7f0000001780)="69f5e266ffb7a8c7d1633295e1b4f4fd5530dc669407d314d6926f11c56401d01b82981f12ddacaa0d178ab174e58d0ee8cd012cf2c05f17a0e54d1538d2ba871caa629974cb7f0efbc58545101a54a5e7d1ed8ed34523d649df4559d8fdbab8aac1309a39afe4bf3911d24c6864341abdeaee0718ca35464f34e5919e0e36bdf758b14b6877b693d1590b7900f562931ebdb777304b455cc7e5405ab4c91b57497d70a745b993c07f25ae2ccc0e", 0xae}], 0x9, &(0x7f0000001900)=[{0x108, 0x109, 0x8, "1cb293933a7445ba402bcba43dadddb90b300d8361076e6cd222c9de4a9287c209a0772aa95537c95d0b8f3e65aa30bcd383e563510096875e193d34c15ebda49a80d2f8bb973b7f02932c730533fd0c81f81a36e1f11f15322f591c44f23fb598cfdc9973299492b7d0090b8a73ed7a2d8ecc01e5dcf934bbdc0757a5a7e9a63fd004d4eac6c39128c6e3bfa8e3bfcbd9e3198973485ddb3418946aa9efc5a58b3a9d67acd5321e6a6419fa3a939bae620ccacca745a6f91ad9df390b77fe575183edd1634d44011855c14a1ad85fb64fe0eda94f7e9a9f645115d04a4fd2327b9f35ed70825f3962977a64d50bc7b8b8"}, {0x98, 0x10a, 0xb929, "9976e584a82b058b49f36426cbebafa7ad236b5161f34585b592b4fe3a0d907f1fadb0d0f8fc0dd2bf878e6f284aa628b321ecd770826a6fc6226c4ffef70c1d078a8445a1b3facb8ba72738b8940cf79a095dd104444c6cf3afa197a99b3df77804127663d10e11919d9d11954ac120f3e971e4108efd7d60f4c86f7ccf4c19c6c7071900"}], 0x1a0, 0x810}, 0x2}, {{&(0x7f0000001ac0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001b40)="08f54f5a72e1015c522292837e55af5d92dce066cedc84a75a8037f298883cc7263e78ef8daaa5601264dde54f4064b8d7c784ed509629733ddf92d59f657936c2786c622f67ee978809680a54b1170e6ae3601096d095e24dd0441dbe5d11327e866ec3431a64a0b67334fa28fb6264", 0x70}, {&(0x7f0000001bc0)="1df16dd202db1a9e6515f39261bd996d1a1f95384b32a20f594bf6d01e096a910c679cf91fa2136416b9c549f0d2d3cbf02fe78367eb082fbaffdb170bdc000f7e1dba4ad399c76fd86ad691aac223bb907783e9b7bcf0653fb9922634da6d3ce6491bb084351ffac5d87d7d63bf67f0dfdc48e2fd8ae90ebae33447be0058ade17a7cd5994aec7d528048", 0x8b}, {&(0x7f0000001c80)="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", 0x1000}, {&(0x7f0000002c80)="f9c9c0d870e007fc", 0x8}], 0x4, &(0x7f0000003000)=[{0x60, 0x1, 0x80, "15b95425140441b8123c268e306e448be7ab4e1b0da5788e3603e2ac347be741104935092567e54956033e15eea6f46621c9d4a393dd71478ec815bd122c43dd8be5b13ce4d3a59935ddae0f3664"}, {0xf0, 0xf7cc63ccfd2f3986, 0x1, "aa728efd6b0e6466659bc59e2a14a677e8afa147484088860dc5c94e332573584c67771769d3a1f1649ab66b8c76fae947915aa701314f64b7e6c1f8ada51c89f231cf423b783a7db11858098aff01d79c3aba8c2c270113718cd9727f0b3e302f7ec97d0ad134b53acc43d007a28386fd51b958405ca64270b80659d7f19cb09a091b6c0b1bfbf17cfea0d1c32e5e7f49bb9272229d6524fa9571e27bbcb568b707b693b2bf38a579e55f5cc534bd40d506ac60f5fc67a95f3028fc85d2c2a23ff6eab09189659b98c0a29860eb3e65c453168082672fb22c"}, {0xe0, 0x11b, 0xce, "69dc8a15863fd21ab728c8f4e5c454bc919947f4528aacb1d8af29943efd7ba0258373ccd311bbe00b1a1032b5ee38c212f9c25035ed726ab6905d276c9180a4821db4d1dd97c4a02afaddd5bee61696f965adfd577eaa87a65bdbbfa9f630f5ad057a2763679f66ba3a1b37f473d8e1017c60db203de8ab056551b2d16774bcaca6d19b5adb71f28bc5e5323a767ee5b2bef19925d9aaf72ad6a4209f3f7bba7786d29f70110c5990c20d2460b075c53bb88b9e736ccbea4494ebd8c2c46776cafbc401087c8292bbdabe"}, {0xb8, 0x104, 0x0, "f22f6ca715ed61c15a632a3b68876d2087784824612ced518abc5517e5d57e253c10ce1f2ff79e96c60852441d98a5a25f7e284f741ac2f7523b8ce6d366c0e6aa6a2a7945a0e4100bbed9a2d14bee6c0957cc64c414d5b8c5ad420688d0d18fd9788a4a170efdbc6631d57ad25c2ecb769cd3bcc0b9cf72151285e7c54bf25864ba090b2ff2109ae7eb2af422de17e9e12b2344bd840aeaf50e7375b07aba81a86731"}], 0x2e8, 0x8000}, 0x4}, {{&(0x7f0000002d00)=@pptp={0x18, 0x2, {0x2, @multicast1}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002d80)="19a8fd43ba6b9aea8d01e44bd82c5d49a34920d71658a804b250a5e17267fec8a071cb1e2e6c94971db628e382f4dd669b29af42ecd1e4a7fd6cccc1e1cfa665efec69893b879e738788c0c3eb5988043111735a98f0ad73f9d2f02d123f1b1a9abfd17dd83f74795e69e5d4fc3508bd96d8500861d41ef6003f2d9e79b23108e8a6b869172e1685da3bdeb82c22788a04fbc48c4d4b1f42709ee7ba1aa7917100bb404c307c16688e2a8e07030bc0685636a8a2219174273a63c8b0db62143de998052cff25051e9aafe686ed4b328e1bdeeec35061789736d4c033f7e7f65f3ba7bc8d69d36a738ddcfbf3e61949e870ae98f823468d9364", 0xf9}, {&(0x7f0000002e80)="519662986d2194360ab74d13edb50820811481847abd2a1bf78b4932ae2e2bdf28adeb445f3a42868414b026af39f600bc3110f4f8951ed19856cffc37847163feb9e8503f7d2a2ba2c8f22190a971311293a00ed9ab980f5ad6e279e47a1385a81d93fe8217c3324c3116861ef1fcc6d132de5a955537575078", 0x7a}], 0x2, &(0x7f0000003300)=[{0x110, 0x3b, 0x7ff, "478bc1ea83c18a5175f5705e70b32d183693076df6b876b349b9caaa59e9f5f03d4eaf17b4d51cdc01f59b3b23c8b950038fb1b28cbbf554957dbd6d1c7e2146ce85f65993bf4f72281d902db69ed1a2848446ea240149e49d6d1a02b25483360ce3c1b019611808f2b538de78077bd6dcc13ff2a010c89edef62a773769c9b320051daf5f4b780efd946ee8f4f165d52ee9e6aa75c1eff32a93096183760d4ff0033bb95d1eefc394d66e535c219d6ef6dc4af3f67b0ba6261e686d45998b1aff372d96c5d510a7ee48d27cc59143c7433d731fcd5e46058cbab7d7ef537bf5c1707ac9c6ebb205663747a3eeda8bf436c8d6c3d26e2ed0fb7fcc617365c3"}, {0x48, 0x0, 0x7fffffff, "e2e29d00db78a745f78eac649131b664e1d9e8ac3bcc8cbd1bc730e111ffb77bca3d04f2daa26337219f44c71437f69cb4"}, {0xa8, 0x110, 0x6, "8788f0fd122b550e767e523f3ccec423f80c72807b11c34897cdcce8275ebf24a35024c26fa268df8effa0a3797c81a96a3408a979f370792aa984923e6aeccefaa31b8906352dd31958fa3eda5b69e5603bae8c4ce62d7314f3166af4c999cc30620d21814672f825d3d786e727d8fcec5505e522cf7d2be1c5f407e184b846e6dd94548f96cd006669e018ad647f6a11166c733f5c"}, {0xa0, 0x11f, 0x8, "0677e1f3e6dfc4276f9ea6a8ee989e4ac6718a2a73ef3c1be602cdc48ea03fc5f314eb320cbc92e14751ad119936840fc6ae0d0d40c9cd9a37ee69c0bef8313f90107ae843831d4570382e4dd9ffa5fd3a928e705124f02982281d6516faf3928cf1ebc30a74b7b24f1af23e6aa886b7458768180a7e9acbfeb847e5835ee775ec6f34fcc4e6027b2e"}, {0x48, 0x13f, 0x9b0, "7e8611099e152f9341e3fa8821f01d7889eff8b006c4a249513a9ec9c3d1b5fda5afaed7a9dc14e311e6959aef3bb3bdcd7947ab8e9c"}, {0x18, 0x111, 0xffffffffffffffd5, "5df79b5b"}, {0x88, 0x0, 0x5, "5956af7b724aba0d04692f1d011eca14dfb689246907ad445d5718a47779c1da683d2e419e5b9368fb580036cfc76328fbc497b22d74b91acdacc8e1e51865d9f948cf35c65e2d615a84bd26bbc90edd1782224124cce143739e50080c0b0e57bbc806c484ecf668ffcd6439448dc039fe1a00df65dc45"}], 0x388, 0x4048040}, 0x4}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f00000036c0)="8485effeb56fda292fb799272469f38325dfc38c64ac76b4154b56c558e1379172c097f6fd98ef19bae9467751b4a326531413c7d8fd93be07a65382e98f4911c4ea1a87a5007aed0bdc5bd319c7a47adb9787f4ae0a172f29e86d25abb1ddcfbdf9ae60570df13cb64df77cd624ec4c8360eb52422666aed7eb0bd4d8a0b7f0db3cb5f072fd713881a7778d275d646ef85c87b0741a64157050342159516d839941138e0bcb4b4fc3e4ce8b8dce30861df69f5f1550c97dd5fcf2e4fb93a1cfc36ad1abbfd6dd23c55d2b2ec7c464d6d4204979ee2def9580813648f642e7e0e33dfe8a96093bce4e8b64d85be6ad", 0xef}, {&(0x7f00000037c0)="2c67e2edb39e292c4dcf08f458376040bbce098a2dd2ace8874920710e19d1cbd79c104fa55f39f665a7346532c11e5dcd2c4c23a5a8f4a65cd1ae9b6454d6e2f8c643d6979416f47bd4e7a2d89450d53d312deff7865093973f45f30400c414050dc50fa801a45063c4eb24463e45d950cfda3168fea41558a1217097e04aebc6643d71115fb7f099ba465a14ca3eabf321d0c9376f4cec1a9e15bb9a3f12cb592e7961f6223e464ac1de61fc2d31c9118456", 0xb3}, {&(0x7f0000002f40)="bf4d6518333fe60872d4f5d05c8512f6de602df3d736d814f0c6ce91bd19aec11830aae917592f7299e5e12a026f514f6e7f6b3097f7e266f49f3428", 0x3c}, {&(0x7f0000003880)="599d2ec594a00ee75f5aa51866c8c54bda2ae1f45f315b1c7cf0c4dc272b799fe013e2461a7bd0d63e4fc61ab417d9bff330da4ae2cedd98c9e3dfa8ee1f3290ca2c1b39d945856d3ecc2cb489f453e82a94", 0x52}, {&(0x7f0000003900)="9f13d4a9e2971cf7e044b5fd705bd2fc3de2e8334d511b38bec1d6ecf9af81fd91cde38886b313bb7ca039d8b83e77882ddfa76b1e0966b57c51e67e4afbdbb083580109a0e1e2c3fd2d8acc48fd67ea6ee98167df5273cc1e63873f", 0x5c}, {&(0x7f0000003980)="042e5fcd5f2a2c52ff2ef44f01ff9919648982dcd7c4b9bebf8e6d52f2242c7211c9100ea40221344cde4ec1c943d6dc0317c4825b74db1811b823c885ac23058389cf490aae4fd5532774a7d3f7e60d928efc65dac27b50a843938dc2a9d24f1ee50e9180a06d33233213150ebf", 0x6e}], 0x6, &(0x7f00000057c0)=ANY=[@ANYBLOB="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"], 0x208, 0x8045}, 0x5}, {{&(0x7f0000003cc0)=@in={0x2, 0x4e20, @multicast2}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003d40)="8f141ffef4798220b4936c70182589e21cde6a0e4dcb4bf003093b62eaae1853da04d3ab6333ab0b79ade4e83d8853dd73e8f0b13b51124f1b9c6f635c245cc7981b9d3012378f2fdc11d0832e2e2ab7649326edca44862b8656a8993cbb1e2aae1f6ff951fb89b287c44b607c8a8169482cfc07302165320afb337553f8ed93677f1dac378ef137135897ad1939aaca095b28", 0x93}, {&(0x7f0000003e00)="8a9d46b8d956ee9e6f08741c4c2ebbf0286fb2a64bbeefd4447e172df614d86480f61a1068900d4394aaf6d8b8ba7dcc1975d9ea85f604cb60caa328e4b29b5ec06e79399a5c572be398251760e97dbb486f54478ab3d08b971bf031363902579595c323da9df869c241168237f970f8dd382e0030f21203dbfa8587811606714716a21585c500e0", 0x88}, {&(0x7f0000003ec0)="0c8ce3c82a5c6e4f2e99fc6953aa012dca98e81d2bf6c64a9ebc3fbe4606a292917fd6cb7df9fe43a5c6070630240393a4ecea402122128da928d4d8c36dbb60a99e1a5cb630cbe38ccc7b997fddff36d4d67f9fd9eb684d655385df05d5f5b22670680cecae053c9395dc82724d75a3d4e782eb4885f47517e658a3ad6b2adbe8667412abe07f63a581045027d49980f99042f02bc9d01a7a7ab4cd7e927c", 0x9f}, {&(0x7f0000002f80)="bb71f8c7487622793325098e", 0xc}, {&(0x7f0000004040)="c4e44884c544a63488f2e983418bd064747378ce612d0c9aca2acc60bc6c0274a993e7117d58a0c9c355d729e0d97d813419c1570205179fddc0e17f5579fa5e31e62c39e4691c5e3b101d2acee1e45dfd380aea9f990426801701726c2e9ae8c8835ae9f25c7a2fc20810e388c64d8ff9419efef7e6405622f6c8e74eb1e597b01556fe232a6d1407b45868c4b418b2a2", 0x91}, {&(0x7f0000004100)="42d6a6fa1941fa62a68999cbb8ece5a7a633d51eeeb729b1d2b70409803ab34be46416324d910e33e248dea3d7acb91f3ccaa1abf6f100df39e6914005f9ba7b776206459a1487ce65cfbe01d530b999d666d60c3ebec06e5282b9f0f2e13e79de519466dbf63f4fe8dba979a13cdcd72ad143aa97cc2b129df5831d3efb7339bbd99d3ee1a22c944d4ae6f95e75fb036ca8e5e5f0b8c93c6831894fa3658410802ffeec87b32a1ca7f80673960c7d424d1d168030eb0376294c51b318aeb346aebd54", 0xc3}], 0x6, &(0x7f0000004200)=[{0xa8, 0x116, 0x6, "cb5919d29e82d742e40b9146fbd2463fa25947a404e29393a8ff78f783c9fb993394ba091af31a608a2864341d91210e3437522b9d061ab83463493b99c9a952abdae4ec2bc01a22a55d459626af81174115f5626f1b570bd4b300829cf29e65a9112e02d3720bd714d675d95e7aa22ab31d7f7067b3fd2225e2cc8b7d2a461adc8d050b2e1a73d8f489c6795c1c32e6e965baf3a388d8"}, {0xf8, 0x107, 0x8000, "2cb6e7ecbafc14459b0119e1ae298bdc6664d886193f798840ca6b9f2a44f82d30f08397855097be28334c6d7021dc82d04d66ea41e09dd6e92a199193914de09ba979a05532bc992492122e0804448ac43f8fb355f4927b29de16976133788a55f1dd943ec31d09c5d67d3c8867f9f865b39dc94e38ff510d06f08fb957bcfbfa10675ababc74817cfa2b9d8a529b39ab5ae7dad599b60423c36603bd5bf29d53b167ae2344871547a639d2d394f144de0a6c42c18d8ed4f82e5faa096b099e902525772c3b939b00907bde909c5c90518525c93af225c6bc0c8a73d0a04dde8b93"}, {0x1010, 0x10e, 0xff, "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"}, {0xb0, 0x10a, 0x7, "bd58d197c6bd1aa2d3ade1cca2e5c1e1a08bd1a0d9174fbbb5455c994175e49a4bd6e3e38852bd8e0f6a94aa0db818585e4f3f58046c84d2775dcd1fb1d85398c557f5614905e4c7d377f81365e0e0f25ef54d60addb5d87a374799af3e05909351d0a06769b58bc6f674d37bdffa4526de447c47e05aad2385e704542de63ca044bfa7d3f04ffd9f7307c530d4e1604eb98b96f98de98b28223"}], 0x1260, 0x4000000}, 0x100000001}], 0x6, 0x20000080) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000005600)='/dev/qat_adf_ctl\x00', 0x424000, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000005780)={{&(0x7f0000005640)=""/208, 0xd0}, &(0x7f0000005740), 0x8}, 0x20) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f00000000c0), 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x3, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 07:22:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x375, 0x0, 0x0, 0x0, 0x25dfdbfc}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x26a, 0x0, &(0x7f0000000100), 0xffffffffffffe82) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000000c0)={0xd00}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:22:07 executing program 1 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 309.861635] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 309.868889] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 309.876168] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f70449b26d4 [ 309.883441] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 07:22:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="2d00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 309.994186] EXT4-fs: 10 callbacks suppressed [ 309.994196] EXT4-fs (sda1): Cannot specify journal on remount [ 310.019107] FAULT_INJECTION: forcing a failure. [ 310.019107] name failslab, interval 1, probability 0, space 0, times 0 [ 310.032156] CPU: 1 PID: 8498 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 310.039031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.048392] Call Trace: [ 310.051018] dump_stack+0x244/0x39d [ 310.054678] ? dump_stack_print_info.cold.1+0x20/0x20 [ 310.059893] ? __save_stack_trace+0x8d/0xf0 [ 310.064255] should_fail.cold.4+0xa/0x17 [ 310.068343] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.073468] ? smack_d_instantiate+0x136/0xea0 [ 310.078067] ? save_stack+0x43/0xd0 [ 310.081707] ? kasan_kmalloc+0xc7/0xe0 [ 310.085625] ? find_held_lock+0x36/0x1c0 [ 310.089711] ? zap_class+0x640/0x640 [ 310.093452] ? find_held_lock+0x36/0x1c0 [ 310.097550] ? perf_trace_sched_process_exec+0x860/0x860 [ 310.103014] ? lock_downgrade+0x900/0x900 [ 310.107178] __should_failslab+0x124/0x180 [ 310.111439] should_failslab+0x9/0x14 [ 310.115249] kmem_cache_alloc+0x2be/0x730 [ 310.119404] ? d_set_d_op+0x31d/0x410 [ 310.123230] __alloc_file+0xa8/0x470 [ 310.126950] ? file_free_rcu+0xd0/0xd0 [ 310.130841] ? d_instantiate+0x79/0xa0 [ 310.134737] ? lock_downgrade+0x900/0x900 [ 310.138893] ? kasan_check_read+0x11/0x20 [ 310.143045] ? do_raw_spin_unlock+0xa7/0x330 [ 310.147459] ? do_raw_spin_trylock+0x270/0x270 [ 310.152053] alloc_empty_file+0x72/0x170 [ 310.156121] alloc_file+0x5e/0x4d0 [ 310.159664] ? _raw_spin_unlock+0x2c/0x50 [ 310.163825] alloc_file_pseudo+0x261/0x3f0 [ 310.168067] ? alloc_file+0x4d0/0x4d0 [ 310.171875] ? usercopy_warn+0x110/0x110 [ 310.175953] __shmem_file_setup.part.50+0x110/0x2a0 [ 310.180978] shmem_file_setup+0x65/0x90 [ 310.184963] __x64_sys_memfd_create+0x2af/0x4f0 [ 310.189635] ? memfd_fcntl+0x1910/0x1910 [ 310.193713] do_syscall_64+0x1b9/0x820 [ 310.197605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.202999] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.207938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.212789] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.217809] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.222835] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.227859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.232716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.237906] RIP: 0033:0x457569 [ 310.241106] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.260037] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 310.267747] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 310.275016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 310.282287] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 07:22:07 executing program 0: r0 = socket(0x1b, 0x4003, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x1, 0x4) accept$alg(r0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f00000000c0)=@ipv6_delroute={0x30, 0x19, 0x701, 0x0, 0x0, {}, [@RTA_GATEWAY={0x14, 0x5, @ipv4={[], [], @local}}]}, 0x30}}, 0x0) [ 310.289553] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f70449b26d4 [ 310.296821] R13: 00000000004c4c75 R14: 00000000004d8258 R15: 0000000000000003 [ 310.366949] EXT4-fs (sda1): Cannot specify journal on remount 07:22:07 executing program 0: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@nfc, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x3, @empty, 0x200}}, [0x5, 0x4, 0x7, 0x7fffffff, 0x6, 0x4cd30441, 0x9, 0x81, 0x48b0, 0x2, 0xff, 0x101, 0x3, 0x3, 0x8]}, &(0x7f0000000280)=0x100) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0xa2403, 0x0) syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000380)={0x1, 0x20f, {0x7, 0x5d, 0x3ff, 0x9}}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={r1, 0x1, 0xb3c429a07e3c9d42, 0x6, 0x40}, &(0x7f0000000300)=0x18) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f00000000c0)) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2a0802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x5) pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) [ 310.417927] EXT4-fs (sda1): Cannot specify journal on remount 07:22:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:08 executing program 1 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 310.562459] EXT4-fs (sda1): Cannot specify journal on remount [ 310.620931] FAULT_INJECTION: forcing a failure. [ 310.620931] name failslab, interval 1, probability 0, space 0, times 0 [ 310.716358] EXT4-fs (sda1): Cannot specify journal on remount [ 310.732279] CPU: 1 PID: 8530 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 310.739141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.748498] Call Trace: [ 310.751108] dump_stack+0x244/0x39d [ 310.754756] ? dump_stack_print_info.cold.1+0x20/0x20 [ 310.759962] ? print_usage_bug+0xc0/0xc0 [ 310.764054] should_fail.cold.4+0xa/0x17 [ 310.768132] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.773256] ? zap_class+0x640/0x640 [ 310.777001] ? __lock_acquire+0x62f/0x4c20 [ 310.781260] ? find_held_lock+0x36/0x1c0 [ 310.785344] ? fuse_finish_open+0x408/0x4f0 [ 310.789695] ? perf_trace_sched_process_exec+0x860/0x860 [ 310.795174] __should_failslab+0x124/0x180 [ 310.799446] should_failslab+0x9/0x14 [ 310.803260] kmem_cache_alloc+0x2be/0x730 [ 310.807417] ? zap_class+0x640/0x640 [ 310.811155] ? print_usage_bug+0xc0/0xc0 [ 310.815262] ? mark_held_locks+0x130/0x130 [ 310.819523] __alloc_file+0xa8/0x470 [ 310.823255] ? file_free_rcu+0xd0/0xd0 [ 310.827157] ? find_held_lock+0x36/0x1c0 [ 310.831255] ? is_bpf_text_address+0xac/0x170 [ 310.835779] ? lock_downgrade+0x900/0x900 [ 310.839943] ? check_preemption_disabled+0x48/0x280 [ 310.844987] alloc_empty_file+0x72/0x170 [ 310.849065] path_openat+0x170/0x5150 [ 310.852893] ? rcu_softirq_qs+0x20/0x20 [ 310.856893] ? unwind_dump+0x190/0x190 [ 310.860805] ? zap_class+0x640/0x640 [ 310.864567] ? path_lookupat.isra.43+0xc00/0xc00 [ 310.869331] ? unwind_get_return_address+0x61/0xa0 [ 310.874276] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 310.879322] ? expand_files.part.8+0x571/0x9a0 [ 310.883920] ? find_held_lock+0x36/0x1c0 [ 310.887997] ? __alloc_fd+0x347/0x6e0 [ 310.891814] ? lock_downgrade+0x900/0x900 [ 310.895969] ? getname+0x19/0x20 [ 310.899348] ? kasan_check_read+0x11/0x20 [ 310.903500] ? do_raw_spin_unlock+0xa7/0x330 [ 310.907917] ? do_raw_spin_trylock+0x270/0x270 [ 310.912508] ? __lock_is_held+0xb5/0x140 [ 310.916576] ? __check_object_size+0xb1/0x782 [ 310.921091] ? _raw_spin_unlock+0x2c/0x50 [ 310.925251] ? __alloc_fd+0x347/0x6e0 [ 310.929158] do_filp_open+0x255/0x380 [ 310.932973] ? may_open_dev+0x100/0x100 [ 310.936972] ? get_unused_fd_flags+0x122/0x1a0 [ 310.941568] ? __alloc_fd+0x6e0/0x6e0 [ 310.945384] ? __lock_is_held+0xb5/0x140 [ 310.949471] do_sys_open+0x568/0x700 [ 310.953202] ? filp_open+0x80/0x80 [ 310.956760] ? trace_hardirqs_off_caller+0x310/0x310 [ 310.961870] ? do_sys_ftruncate+0x449/0x550 [ 310.966221] __x64_sys_open+0x7e/0xc0 [ 310.970033] do_syscall_64+0x1b9/0x820 [ 310.973931] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.979304] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.984247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.989135] ? trace_hardirqs_on_caller+0x310/0x310 [ 310.994181] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.999272] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.004305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.009163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.014387] RIP: 0033:0x4111a1 [ 311.017601] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 311.036506] RSP: 002b:00007f70449b1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 311.044220] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 311.051490] RDX: 00007f70449b1afa RSI: 0000000000000002 RDI: 00007f70449b1af0 [ 311.058762] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 07:22:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 311.066034] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 311.073306] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 07:22:08 executing program 2: pipe(&(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x2, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r2) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0x7, 0x47b, r1, &(0x7f0000000980)="a29be28ac8bc949b527b1a32db4a4917b908b6fb457b18ec4baa13ae9cd2402c2915f04bec2a01c17645b7b24b74a4b49fe0fae9bd53cb242ba4fc27f6c6c23767a7cd9431870c4a605fab3f23ef8017831dee45f1ed3ac7aa524ad80d509a13d32e2282611ecc688a2aa31675cbccfa7e9deef9a503b771c810a6ce5c46c74d43668052222714dfb5b442f710ba37f9e0ef167394f4dcd794648aa032bc5418823884f77dd8a62b391076dcbcc849215e3fbb7d2002b266ba9371", 0xbb, 0x3a6b, 0x0, 0x3, r0}]) read(r0, &(0x7f0000000200)=""/250, 0x78000) 07:22:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9b5) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) getsockname(r1, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000240)=0xffffff82) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000001980)=@assoc_value={0x0, 0x8}, &(0x7f00000019c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001a00)={0x2d9, 0x2, 0x8, 0x0, 0xca, 0xfffffffffffffff8, 0x10000, 0x6, r2}, &(0x7f0000001a40)=0x20) lstat(&(0x7f0000000340)='.\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x0, 0xfffffffffffffffe, r3, &(0x7f0000000380)) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000040)={0x3, 0x109, "831068d725294485384e912fd3b13e91940bf07e39a36457b616ef6aab5e1d54", 0x6, 0x0, 0x2, 0x40, 0x18}) listxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/182, 0xb6) 07:22:08 executing program 1 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:08 executing program 3: r0 = socket(0x10, 0x802, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000880)='cpuacct.stat\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/snapshot\x00', 0x2000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vsock\x00', 0x123040, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000940)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x100) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0xa, &(0x7f0000000740)=[{&(0x7f0000000140)="6fc367ba4dc65a0333218026c0c832db9e57e205102ab331fae26881e48aeb0eee654ed91011a226579898b7c86216922519663d4caadc860043cb284edc", 0x3e, 0xff}, {&(0x7f0000000180)="afe1a5acd59c997acd208e18f886271dfc87dc4228bdaa1ed0b8cbb0ee8653fcd8226cfcba26856b3ed69cd789794411742c99c1cdf9225322c511812cd2dd12bfcc11425060277a3024b324c9c50e6f46e0acd00b48af860e980d4efb69ccb17769b382df66de7dae71a915e223b0d0be34ceb1f3379ba38a9f1b16e24c8e5a764f261fa9b9a207ce6eb79828e132225966f4dc829f90a64e93cbb7fcbb2713664ca840afecc2a24a999bd5bbf9cd910e98ab3aaa5a39fa4e31d688c1891171aa70ce2bc96d7b0163a7be70a1e41f5a99fb5c6fa5a1637c3c", 0xd9, 0x7}, {&(0x7f0000000280)="98bedfb50370bc32376369170f95e46d8bbe05d0e9abbb8010ae2d4c9574667012d78eac9d572cafa4e8e216060c389e7ad792312bef0649e30c1be3fa20993c10532dda099e2bf4332f8c7d6ba208ff40b6598b1fda03189132a0ac61a060aaa38753b8ed574f1e75046487b33d718d568fcfea2c68ec6736b6a88e415a187a55838b9d62ca1e9626a18bd88a694f1b10a40c1259fdef3529c15fa11babcd6fb7c6a08cf1a2c99ecbc697857bd0b2a164ef14fc2bf20dcc11569dd622576220d021878554367025f1887b541b4352df9ca01029", 0xd4, 0x4}, {&(0x7f0000000380)="ff2ad9fc4a63f24cd167457dc4189a534b778a68122313119991f1668f0c703b1ef19b7db9adca9f2fe0fd8a3b1eb5eab08cc4c453d90dcd0fa0763a55eb5c9b94e532e39886b3313846ee0af336c9b41c39bc24b3605eb1722039c56b1e67509c64cd663cd19b57b8f2f421e2e83bee20f424d3cb37f2bbaebe948939e2997d658e7c442f56d84f105481f1", 0x8c, 0xfffffffffffffffd}, {&(0x7f0000000440)="e7abe6537b07c91782e4e07b9745c516206efb3ca487c5e3ba87c5cfa0146878140232c5b45b0ce8ee4ff151795fde65273d7da1c638df682e0bc698e81b60bc419c51876e8513f6ec64dd47c35859e2716e7531645c526d3ef0c47b669b31c7a9017df292ce04bc7fbefed776bee8f4c9495023f09058fec0fa3db5", 0x7c}, {&(0x7f00000004c0)="a4400902e9086434b0369805e4df614932bb5333f935fdc308640024bdd620a2a722ce70a3d9cfea6de76cb4d72b9f814e7c", 0x32, 0x2}, {&(0x7f0000000500)="578eb2c3f23131eddc937fe858250d5176a54a2ecf232f897ae09c3a2912ddd8f181832700372e0bfd5956705d7cc9525d87", 0x32, 0x4000000}, {&(0x7f0000000540)="c6c19d4cb08dfb72eacfed5ca839bc100201446bf82d525f7c8fbf3992f0d23479bb6bc7f782a37d6391f7002d67948e0ec6c6a3a9cac1aea589672f0ccf5287001b1ddb6fbc1b68dda6de9709c1a13bf7fa60ac73fa897c0b5fc8ef0a74c5d5316bf0c965fa01c9e639013d605dcd49baa4f59853bcc1b4ac1d", 0x7a, 0xfffffffffffffffa}, {&(0x7f00000005c0)="2049d762e00d03056e55627ced808d28815aded11af04a61811fbe95e3d2a1b5cefbba2c064ba749ce75465dae61ff0b8c9a992bbb63448ef7a728fc583f9694614a3f892bbf9374cbb0abc7fc0decac247b865d308afd27e47e035421104301f27958c8000e5d51e235c81b6c462b47994efcc98cfe3dd5cad75debfae4918f136779de214cefd2785625483559d0b21e39e196bfde0b70831f94ee27c70338cbf88732ea7712ddee70acb32a989f9823bb635b4f09b9352c4fb9205bb670f601b5c49dee9479dd7b23ddcb64dcc0e3b59b41fd395f98337e2ea85d4392d134a6f8", 0xe2}, {&(0x7f00000006c0)="1c6a123edd58164b6c61aac018e955353ee2e723b0034269c43968253ac8ae4ff241766145dbead471c3374046354182101c9b5c56ae98ee1a43fa32d631e6b2088e44a9d9", 0x45, 0xde4e}], 0x800, &(0x7f0000000840)='vboxnet0\x00') write(r0, &(0x7f00009c4000)="220000002100070700be000f090007010a0000c500008000002f0420050013801045", 0x22) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xcde, 0x48000) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0xf) [ 311.182093] EXT4-fs (sda1): Cannot specify journal on remount [ 311.195262] Unknown ioctl -1069263324 [ 311.223166] Unknown ioctl -1069263324 07:22:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:08 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socket$inet6(0xa, 0x1000000000002, 0x0) munlockall() r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000000c0)={0x4, 0x9}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) io_setup(0x0, 0xfffffffffffffffe) lookup_dcookie(0x0, &(0x7f0000000180)=""/216, 0xd8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) [ 311.283885] EXT4-fs (sda1): Cannot specify journal on remount [ 311.362808] FAULT_INJECTION: forcing a failure. [ 311.362808] name failslab, interval 1, probability 0, space 0, times 0 [ 311.379770] CPU: 1 PID: 8556 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 311.386635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.395996] Call Trace: [ 311.398605] dump_stack+0x244/0x39d [ 311.402269] ? dump_stack_print_info.cold.1+0x20/0x20 [ 311.407486] should_fail.cold.4+0xa/0x17 [ 311.411564] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.416684] ? down_write_nested+0x130/0x130 [ 311.421102] ? down_read+0x120/0x120 [ 311.421125] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 311.421146] ? zap_class+0x640/0x640 [ 311.421161] ? lock_acquire+0x1ed/0x520 [ 311.421180] ? lo_ioctl+0x8e/0x1d60 [ 311.421220] ? find_held_lock+0x36/0x1c0 [ 311.445797] ? __lock_is_held+0xb5/0x140 [ 311.449872] ? balance_internal+0x2a8/0x3f5a [ 311.453648] ceph: device name is missing path (no : separator in /dev/loop3) [ 311.454336] ? perf_trace_sched_process_exec+0x860/0x860 [ 311.466971] __should_failslab+0x124/0x180 [ 311.471230] should_failslab+0x9/0x14 [ 311.475047] kmem_cache_alloc_trace+0x2d7/0x750 [ 311.479741] ? check_preemption_disabled+0x48/0x280 [ 311.484789] __kthread_create_on_node+0x137/0x540 [ 311.489652] ? loop_get_status64+0x140/0x140 [ 311.494074] ? kthread_parkme+0xb0/0xb0 [ 311.498082] ? __lockdep_init_map+0x105/0x590 [ 311.502592] ? __lockdep_init_map+0x105/0x590 [ 311.507144] ? loop_get_status64+0x140/0x140 07:22:09 executing program 0: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, &(0x7f0000004000)) 07:22:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010003b0e000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00861800120008000100767469000c00020008000400e0000002"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0xc5d}}, [0x0, 0x7ff, 0x1, 0x0, 0x100000001, 0x2, 0x6, 0x1, 0x1a89ace3, 0x8, 0x8, 0x8000, 0x543, 0x7f, 0x9]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e20, 0x3, @remote, 0x2}}, [0x6, 0x1, 0x0, 0x9, 0x0, 0x32, 0x5, 0x2, 0xc, 0xd43e, 0x3, 0x100000001, 0x1, 0x0, 0x1000]}, &(0x7f00000000c0)=0x100) [ 311.511575] kthread_create_on_node+0xb1/0xe0 [ 311.516086] ? __kthread_create_on_node+0x540/0x540 [ 311.521123] ? kasan_check_read+0x11/0x20 [ 311.525299] lo_ioctl+0x7f6/0x1d60 [ 311.528860] ? lo_rw_aio+0x1ef0/0x1ef0 [ 311.532781] blkdev_ioctl+0x98e/0x21b0 [ 311.536684] ? blkpg_ioctl+0xc10/0xc10 [ 311.540801] ? lock_downgrade+0x900/0x900 [ 311.544961] ? check_preemption_disabled+0x48/0x280 [ 311.549992] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 311.550012] ? kasan_check_read+0x11/0x20 [ 311.550028] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 311.550045] ? rcu_softirq_qs+0x20/0x20 [ 311.564401] ? __fget+0x4d1/0x740 [ 311.564434] ? ksys_dup3+0x680/0x680 [ 311.575572] block_ioctl+0xee/0x130 [ 311.579223] ? blkdev_fallocate+0x400/0x400 [ 311.583564] do_vfs_ioctl+0x1de/0x1720 [ 311.586269] EXT4-fs (sda1): Cannot specify journal on remount [ 311.587475] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 311.587496] ? ioctl_preallocate+0x300/0x300 [ 311.587515] ? memset+0x31/0x40 [ 311.606614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.612169] ? smack_file_ioctl+0x210/0x3c0 [ 311.614941] netlink: 24 bytes leftover after parsing attributes in process `syz-executor0'. [ 311.616507] ? fget_raw+0x20/0x20 [ 311.616525] ? smack_file_lock+0x2e0/0x2e0 [ 311.616545] ? rcu_read_lock_sched_held+0x14f/0x180 [ 311.616571] ? do_syscall_64+0x9a/0x820 [ 311.616587] ? do_syscall_64+0x9a/0x820 [ 311.616609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.616635] ? security_file_ioctl+0x94/0xc0 [ 311.646035] netlink: 24 bytes leftover after parsing attributes in process `syz-executor0'. 07:22:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010003b0e000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00861800120008000100767469000c00020008000400e0000002"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0xc5d}}, [0x0, 0x7ff, 0x1, 0x0, 0x100000001, 0x2, 0x6, 0x1, 0x1a89ace3, 0x8, 0x8, 0x8000, 0x543, 0x7f, 0x9]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e20, 0x3, @remote, 0x2}}, [0x6, 0x1, 0x0, 0x9, 0x0, 0x32, 0x5, 0x2, 0xc, 0xd43e, 0x3, 0x100000001, 0x1, 0x0, 0x1000]}, &(0x7f00000000c0)=0x100) [ 311.651276] ksys_ioctl+0xa9/0xd0 [ 311.651299] __x64_sys_ioctl+0x73/0xb0 [ 311.651320] do_syscall_64+0x1b9/0x820 [ 311.651339] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 311.651360] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.686215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.686238] ? trace_hardirqs_on_caller+0x310/0x310 [ 311.686258] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 311.696115] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.696139] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.696168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.716221] RIP: 0033:0x4573d7 [ 311.719437] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.738350] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.746073] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 311.751830] netlink: 24 bytes leftover after parsing attributes in process `syz-executor0'. 07:22:09 executing program 0: r0 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000180)='nodev-user\x00', 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x28000, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x8000) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x800000000000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ppp\x00', 0x200000, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f00000003c0)={0x82, 0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) getdents(r3, &(0x7f0000000640)=""/111, 0x6f) getpeername$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) sendmmsg(r2, &(0x7f0000001a40)=[{{&(0x7f0000000700)=@ll={0x11, 0xff, r4, 0x1, 0x5, 0x6, @remote}, 0x248, &(0x7f0000001a80)=[{&(0x7f0000000780)="5dfdffde342a9344e6daa6cab53005194a6c4f6651b352249475ccc1ab6cf6ab3337a3d36fb3d505a4c9eb430680c23f300e67da511a341b05b448acbce099bf5337bf397c5f7d3e738bd7398253688df567fb082dc81fbc3f8915ba39756af65adad101437f923b53fed352a63bcd368e6f35901b204cac77cf5536dcf65a38fb43ed2479b27a86eee7b85be115cdd29ade46f9fffe2827808fd754c492a1a5aa186debdf80811462e1aa9016af1057473bb24fc0b87f629178ef18e467c54eaf497161a4e3bb60bfae95", 0xcb}, {&(0x7f0000000880)="e5b502360e113d99d0ae911ea5459788775a80f5710785371dcefa278c7d1c146440cc96b474fc3706f83ea3b9121c69cb10029885c2c88321af69febbc0cbb60b5c10f741549e74273944f00d58f2433517770e948188b882ff926702fbb45ffd20778507ec9f94f60a9369353efa12eae56965cfbfa8c9571237a357c85229072d3fa6f83617728e436ab01b3fa00e85680a66a16d8b9cb5836d811d34dab3168d60a59a3c040fae355968866178b4f31413b76769806eabb1306209d44b8ae2bad20a7b", 0xc5}, {&(0x7f0000000980)="94d68a762b792f641bb694ffa6b763a44d4891dbabf878affa5559747b3a8f97cf3753b0ec59ab495c5a6705a0213f5245b5d3bff7eac16eae8aa8c6eb5bf54a4ddab0694be07763b282c3697f2b8fa155c9a6e0e0c495f09be04aa4d945bbc4d201e96fd4b5691b2c", 0x69}, {&(0x7f0000000a00)="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", 0x1000}], 0x4, 0x0, 0x0, 0x4000}, 0xfe3}], 0x1, 0x800) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000480)=r3) r5 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000002c0), &(0x7f0000000300)="99114950b0fbe20d8f964eab5d327b85eabe78", 0x13, 0x0) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) keyctl$reject(0x13, r0, 0x8000, 0x10001, r5) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002e00)={'vcan0\x00', 0x0}) ioctl$BLKPG(r6, 0x1269, &(0x7f0000001a00)={0x8001, 0xffffffff, 0x8, &(0x7f0000000400)="257ec1835ebd7bd3"}) sendmsg$can_bcm(r3, &(0x7f0000002f40)={&(0x7f0000002e40)={0x1d, r7}, 0x10, &(0x7f0000002f00)={&(0x7f0000002e80)={0x6, 0x10, 0x9, {0x0, 0x2710}, {0x0, 0x2710}, {0x4, 0x437f, 0xfff, 0x9}, 0x1, @can={{0x1, 0x2, 0xfffffffffffffff7, 0x6}, 0x8, 0x2, 0x0, 0x0, "ad1e54e34ac29689"}}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x40810) sendmsg$nl_route(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getneigh={0x14, 0x1e, 0x0, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000340), 0x4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) write$binfmt_misc(r6, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00@\x00\b'], 0x4) setsockopt$sock_int(r3, 0x1, 0x1f, &(0x7f0000000500)=0xffe, 0x0) [ 311.753348] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.753359] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 311.753368] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 311.753378] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 07:22:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0018000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:09 executing program 1 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 311.901816] EXT4-fs (sda1): Cannot specify journal on remount [ 311.909187] ceph: device name is missing path (no : separator in /dev/loop3) [ 311.950634] FAULT_INJECTION: forcing a failure. [ 311.950634] name failslab, interval 1, probability 0, space 0, times 0 [ 311.983689] EXT4-fs (sda1): Cannot specify journal on remount [ 311.993890] CPU: 1 PID: 8594 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 312.000753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.010114] Call Trace: [ 312.012724] dump_stack+0x244/0x39d [ 312.016384] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.021622] should_fail.cold.4+0xa/0x17 [ 312.021647] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.021670] ? down_write_nested+0x130/0x130 [ 312.021689] ? down_read+0x120/0x120 [ 312.021717] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 312.021737] ? zap_class+0x640/0x640 [ 312.030897] ? lock_acquire+0x1ed/0x520 [ 312.052201] ? lo_ioctl+0x8e/0x1d60 [ 312.055851] ? find_held_lock+0x36/0x1c0 [ 312.059930] ? __lock_is_held+0xb5/0x140 [ 312.064006] ? remove_all_stable_nodes+0x298/0x600 [ 312.068963] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.068991] __should_failslab+0x124/0x180 [ 312.078701] should_failslab+0x9/0x14 [ 312.082521] kmem_cache_alloc_trace+0x2d7/0x750 [ 312.082552] ? check_preemption_disabled+0x48/0x280 [ 312.082583] __kthread_create_on_node+0x137/0x540 [ 312.082606] ? loop_get_status64+0x140/0x140 [ 312.082622] ? kthread_parkme+0xb0/0xb0 [ 312.082656] ? __lockdep_init_map+0x105/0x590 [ 312.082680] ? __lockdep_init_map+0x105/0x590 [ 312.114538] ? loop_get_status64+0x140/0x140 [ 312.118968] kthread_create_on_node+0xb1/0xe0 [ 312.123482] ? __kthread_create_on_node+0x540/0x540 [ 312.128521] ? kasan_check_read+0x11/0x20 [ 312.132692] lo_ioctl+0x7f6/0x1d60 [ 312.136259] ? lo_rw_aio+0x1ef0/0x1ef0 [ 312.140167] blkdev_ioctl+0x98e/0x21b0 [ 312.144082] ? blkpg_ioctl+0xc10/0xc10 [ 312.147986] ? lock_downgrade+0x900/0x900 [ 312.152150] ? check_preemption_disabled+0x48/0x280 [ 312.157202] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.162138] ? kasan_check_read+0x11/0x20 [ 312.166286] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.171560] ? rcu_softirq_qs+0x20/0x20 [ 312.175546] ? __fget+0x4d1/0x740 [ 312.179619] ? ksys_dup3+0x680/0x680 [ 312.183341] block_ioctl+0xee/0x130 [ 312.186970] ? blkdev_fallocate+0x400/0x400 [ 312.191296] do_vfs_ioctl+0x1de/0x1720 [ 312.195174] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 312.200706] ? ioctl_preallocate+0x300/0x300 [ 312.205104] ? memset+0x31/0x40 [ 312.208389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.213944] ? smack_file_ioctl+0x210/0x3c0 [ 312.218267] ? fget_raw+0x20/0x20 [ 312.221712] ? smack_file_lock+0x2e0/0x2e0 [ 312.225938] ? rcu_read_lock_sched_held+0x14f/0x180 [ 312.230963] ? do_syscall_64+0x9a/0x820 [ 312.234936] ? do_syscall_64+0x9a/0x820 [ 312.238904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.244462] ? security_file_ioctl+0x94/0xc0 [ 312.248876] ksys_ioctl+0xa9/0xd0 [ 312.252326] __x64_sys_ioctl+0x73/0xb0 [ 312.256229] do_syscall_64+0x1b9/0x820 [ 312.260121] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 312.265474] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.270400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.275257] ? trace_hardirqs_on_caller+0x310/0x310 [ 312.280265] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 312.285275] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.290283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.295134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.300327] RIP: 0033:0x4573d7 [ 312.303509] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.322658] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.330353] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 312.337618] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 312.344894] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 312.352182] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 312.359458] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 07:22:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:10 executing program 0: r0 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000180)='nodev-user\x00', 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x28000, 0x0) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x8000) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x800000000000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ppp\x00', 0x200000, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f00000003c0)={0x82, 0x0, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) getdents(r3, &(0x7f0000000640)=""/111, 0x6f) getpeername$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) sendmmsg(r2, &(0x7f0000001a40)=[{{&(0x7f0000000700)=@ll={0x11, 0xff, r4, 0x1, 0x5, 0x6, @remote}, 0x248, &(0x7f0000001a80)=[{&(0x7f0000000780)="5dfdffde342a9344e6daa6cab53005194a6c4f6651b352249475ccc1ab6cf6ab3337a3d36fb3d505a4c9eb430680c23f300e67da511a341b05b448acbce099bf5337bf397c5f7d3e738bd7398253688df567fb082dc81fbc3f8915ba39756af65adad101437f923b53fed352a63bcd368e6f35901b204cac77cf5536dcf65a38fb43ed2479b27a86eee7b85be115cdd29ade46f9fffe2827808fd754c492a1a5aa186debdf80811462e1aa9016af1057473bb24fc0b87f629178ef18e467c54eaf497161a4e3bb60bfae95", 0xcb}, {&(0x7f0000000880)="e5b502360e113d99d0ae911ea5459788775a80f5710785371dcefa278c7d1c146440cc96b474fc3706f83ea3b9121c69cb10029885c2c88321af69febbc0cbb60b5c10f741549e74273944f00d58f2433517770e948188b882ff926702fbb45ffd20778507ec9f94f60a9369353efa12eae56965cfbfa8c9571237a357c85229072d3fa6f83617728e436ab01b3fa00e85680a66a16d8b9cb5836d811d34dab3168d60a59a3c040fae355968866178b4f31413b76769806eabb1306209d44b8ae2bad20a7b", 0xc5}, {&(0x7f0000000980)="94d68a762b792f641bb694ffa6b763a44d4891dbabf878affa5559747b3a8f97cf3753b0ec59ab495c5a6705a0213f5245b5d3bff7eac16eae8aa8c6eb5bf54a4ddab0694be07763b282c3697f2b8fa155c9a6e0e0c495f09be04aa4d945bbc4d201e96fd4b5691b2c", 0x69}, {&(0x7f0000000a00)="2b1115d2d980dd4b0908ba415e8602d165ae3c9537f3a16ac0d901ca122a47e30efb2b13a3f496c4db3e59edd58da17495e8a1bbc07ca4168694a0042f9d035cf6c471672785b67b9022d6334e5c91d0a9777998fcebb7b53b7de1b4f5642b3f842d60abb7751d117ad16fa628cfd55acdf220dec049f83943c9a1d15e49c504790aefda1552fe44ab8ce23af423237b92b884b589b066790fc6b4e44a36f29243f727e6a7086161b0aecd97f1101d8f08d37f83608dd1a795e56de3a5552f2b75beba21d22236260293947880eac99d95bc418cffbc8429f5d3e11ca6a9ce95ea650e70d151c168c42df545364c6009637f29a63b0fa37d182554379646f9b790b8c63cd935e39400ea647a7273a96090ecca94356af9cd63ed6f808f0dd073330992f8f6f7a237412b9ee780146056f54b94fbc235133c0973c6d0485683127c1a1fbe89baa43094a2a80444fc34b8d0f3fc775f66296f8dad8ba24450f5179371fb9b4765ea73760634ed10055c6c9422a187e5fb652a696c14a4be9fde6adb55aaa3dd53b0fb35f7289ef2d6cfcdf0189fe6e4a8bc3383a69fcd1f5d89f23b3a82dcc8c154be4161f0bb128adceac85b6ab52912b97da150bd5200fc77bffc94703406cd0eeedc7098837005faca677ace68572b8abc877a48888d94a23107162aed3d301e8efe415ec3d778b4495c53cfa3465bc8ede1f39110fbcb4c07c1c62377eecdeb4f7591d44f8cf0bb74f11f5095742ce5d0edab34c1d4d9784a81cf3e0f490929f0b7245c1d0b38d4bccf2954f4d2a660ed17b98f506a437ee081725f240f68f974ff9f6462b192fb5c5838dff1c0732a78e6febdd472f23c5fc9e5c5d5f83cb1337748eeea2846225bc6d006328fe9cfab4c78d1461858e96a68bf36457b7cbf4169c25ae9315f1473527d106b20826a368fd5fc583cf532c591617fc76c9b244d5659d9ed29b12e326ab5d37ec87f778f3c2315e5203dca60182807212b4723334e10f6e522d55644b21d72317eff0751b87e42f7cd360973d45754e3bb5570364869b53cacb01034ea8ccbb49da4a92e55b225a9f9c90bf741843a76aba8bd789cae8b8221195b55da404a8305bf758135e27479a4bc1b3133ab4122b8ab52e7638224b4ab9d770e06c25b3ecbce321fc4984102c7d9cdbe21dd992545940e251a0cfec69dcb4de15fab189b34b3e5119a54d7fba9aa4a8b151e74b926a4072b634a7830471c52cc4b937afb3ff1091420e7c87ef8f9ba556558c8fd2a312011d6ea5f515b78aedeb6fdbbf87b8fb8c9b42f93a340b471908e713c9a26c4b3fed937da415470ae03b98ed9df2d950ab1fae2fb1d3d1fc9c2a465501ae3b2f2ed96701126ea7caa5e83baafec1c91728da062b5b585003f329a5dc050842efb3c49e01c35ce9c03fa8b733d398c7889f3dde736d59935a34c6f6c689375f262ea8f456e3833d6b3d353ab3a638965255ec859018b7f98d957e94b75515113ae51f2ce66e57f9f8683ab0114984e4367da62ab0ab1494dce7e2431af996eea5d3060235c187b7b232a12f180e0800e82ef18ab1cfa91e9d20ea8822306681f035ba26ea363eb641f3bab65b4e9e50c75f5d7970b4c0ac067d39b8aa3c40469e1c1397d05d3b6ccb6897eb94d9ba38a1e37ca653bc995d95930501621cb607404b768189245363b11cac86d63fd0d503d99fd970c4c3391d077e97f63d11cdec982fae8cc24645f7b8f92ab98e004b35d3e6567b7297fd3e7121eb9002b68dcd2db50fb4ce714997492afabc8e0d2ee658a124538592a0162955c0b3aaad4b0c5df4cb6d56086c8670d0142ea3012ec829e0da52b8e76fe37ccfb5acc65abad98736ebf3f2361d5dd8b755c7cf351586567cf34c5341b89125ada00e5d0eebe79b04417e8b6615982b80aefe54d3d1819b3e386cc56e1877364ae4c672c883d861e9ea42e3e14ec3ead4ff30628c6dea1383d17e84820079552e7ec876c9438f3d877fb4cb7ea81ce6e96f6c96e933688a65a7a80ccad848bd86718de932fb1af3944c92bd894e2bbb8dc69b1557f45859e0b3f133bf080c726e93d278aa1157ca0e375c75369865d1c0b647aa3c225f2ea69c267c51e1eb5e0e75ba8c21124c43429c5b912a22db29d0fd9b17bbb21a5860be49e8c9c862a0304eb45eea585ed3ec2ec878dcad9041b2335ea6740de62bfc148d412804f8a0c72525dcee205da180f1ecc150a215cbb86ab47e9f61e3a39d62474c423a10777e835ac00224c95ae47ec6994d01f839ece1839724877b256987bec81eb04a5f22573835a3fa002a8f951be002c955ac60fe8b0f191ad9c4f78a02fadd6ed4428f8c544573c752f9307a4fc67e7a68b4154fc85d6b0fc13558482ac9505b900f29f45903759f067e8c9b693fb47d0ae9dc9e8f85ea1b2a1c8e460c4bdc267f1643b00701a7582a1280cafa3ff9f0fbc728c9e270c96160a5337efc2d114d059f9a7ae287e0ca4e72c676e961d92d4a8349934f64b4c305c8f9a648f4eecfb5e03b331a512efbfd90e9e9d29d5c8ad50f37167e8533fe21fead5ce39ba1e9a50ee9a8607064609615ca88e6c3872fbdf1cb70a32618240444080c6484be9f1337a7486d7b0c5c8fa8a34220b895e9833b622b1167fef87d6a7f48046949533b5dfa909c30d220d57ff0d6ddc734a5311a7340fa39647c23f104e24e035fe64615621dc4d5c9e2a210b0eb7c39182b378b98474b995b0a1dcffc8cdd818f1f90166413acc739529ad576d6c390def88720be28493cd5072a34a6e960c7482ba345dea3114809c27d03f6c139fd8a901144057422837f817bbde3ff5f7c3073562a35f140abc458aef824e84a7ad53e23eeff0701dbbb5954b41a6e73b43a11dac0f4c77c826fdfc69a059c63c2431a8b43a6c65872458755de44eb2d819558fd33a3098f28a68bb8302609d22a3407cb75b52152aca2c38f3cb1f0f548a5728dbc67760cd448647756d0639d8ea799b8f4354260192d16a4e066ed3afa70f899b37a2679fbb05ddc699937b0d106d994fd815947103ec85cd1847e2805cc3d46084f992de869b22da4e2f1a3aeb565b1fe80168c5447ad964f72f837ce7328a2b61ef3175dbe1465024ec3261a9387598d07f7bac14eb478046d259ee2512957a977e65dfd36e521b9c9c2d973909dd8144459a22a62e387649df9cc075c6ee290d059c9965ac28abc2833c5dde6a9276b79fe5eabab958e07405fa19ac6653d5de3580a877ac1c7e15f839e3821350bb75f744d669d89ec54e001d83ff8b220cf03add80fda7f99e6a94f1b17829110260d858a488a1730ebbf2236e36739a765e097a93376e13655b39b62de65eff5c75fb6eab1975e2d60fd29588c5e6d79f4375f938f151aa78eda398a87854607c0c9f8abbdf9d24c89b67cd362cabbe88ea5f1c9ab70d4ee275a7b41bf358a2f1188f2bf360c6e0635a15776624dd8ad5946ed9188a0c7564981a3a0cdb7f66414d1205b16563b8ed44a433c7f6dced5542d94289cf2242478eb4afcd3878243cafa722fc2795ad636ac17c62969d6b33a22093f6c1d050438501a32d43293fa7ae82be314a078828738f5b544ed86bf8b8f16c587fe467b04de13e080835d85fb862c84ef8e95067edab05ae663d48ada5a60cc57291a9de3161a0f62d00a06264326314791463d8dd5f8bb5b8ad8cb56274e314ea1390f55c3f9ad0c219b28967ce273649ccba550c4274f9ce040b0ea8ecc394a816df822fd50fb9b96d9b120ba8fc1e9067af8fc79f7cb2fe07289aaca49115239a212728388a7077a9621adaff8ae7c7f001190284fb3e721b346869785c707aa73b4e6994ed62dfc06ccd2aba706beaf55b7bd36ccae11c641b9de3b5b2c0b742295181c0b24335902cc66ad64a467654ef5b8f70340b900dd9a9354185a897496ffb9285fb67b8f1bd53350be5d7719b344873097e8a60cd54a096e0f89a139057ac15a6f0058dc3703b77339e8043c765ad83a7cf631a9daf70de1e419cbc4b05ec031b433fb843be8cf340c9b2f4ab08f2bece2215bd1b2aae6801ccc9c0a1bf255b1abc6a1f4a244354475e9dcd42f305fa5758473616ee91bfe7779ee2664bcf4d4626f70d1fbf8106edc32d6c47db2d834d580e44dc7a8b4de929f9c58a051923b950f5db0f0a887205491ab696a9dc1a4ca7c0e4111fc0245592c155da555c53b8b1e19d7177a964d72476e55c7e4b20fe1cb249b75fb04223f361bd946e481f6c1542367ce1273c6e70915edc0ac5b94ef6dfeef318162687710253c4376502438b286332fef1386135e66f78adca110aeb1f4442c751c20e2470e4e6ffcd62ad15590ac60ea2b39c925dfecb7e9c51486de7e27a18b215babd6da3850ef461327408dc3fda5e18001a683169ae70ae807dd9dd247761ad86368b8345ef8df361fb653ffcc2d930273216d049ca32b5b76e0b428b43dc34c19fde8234f341e6395f617c0f75a7f387366f8832cd387a53f48c3456cc652812b336be16250d8f2344850fe53fdebeb1fda20d2862e378ae6e09a267c56cfc5519332d468c061bb41c69d9979b868e4b8bdc8d1030619ec8b280e6a9802096286ccd8dc4deae202fb8d620e5ca6b593f4284c96c2335e89b1e13495f178dccce83932b7f0333fd43be6e88500df215b06e38f254de39eafe82fe43979b676995d2af8dabc6165efe6dcbdfb110f10c32790e654062d33a2c8f32be2563f257655d49a0271dff5c048ca2770e418389600033c293e19d64963d0415b5e810a09ea8b2b2a16541f5a9e836cb9a77ac6d935ea726b88d629672ec5c32949c59b928c246a727f6e0d9a6bcfccfb3c7ba10d342e3a5e8e276e8b69c7aff2b8053c53524f2ba8d1fd153bd92add0f3e2bfa5f1c4a8e1c608e3dbb13901a13993a7df8a7abd44cd4ebdfd35188e53c7ab1ab35bf3e776214c875d73fb537fc8285a6e06e96e42d8df7ea7c4c0bf9fa62a860e5956d91468f261fb793efdb29a7017548238080ece8647ee3890fa2354e78a9215e83a2ad55b1e7fa504a37fa7113248a871c41348b131f29ce02070bb41003f8d0cb70c0cf6e6157bb1b7823f615315ff9437a2d388813f4f6fc5af9f4da061c7f6bb25aaecd74e53e37a968f24670bfa6254f8f9f8e3e1f0bea13714a62172d684172a5f6c764ce0c92d7992eb39ba9103438e2685f00faccbf722413650f64b86c01225c44728468d9e76e866dc75cd40e569b4dc43a85cbe79bad98a9854e09e565c69fdcd51d1976fd147559046dc7c47edd054fc45d71778fd6413c4cf12a04a070e0003746c415b1997a4e0db5339761c696232c0bdd57863f5701be2a47571a10f1159d19c51f5156c0b5299c18f15ef3a76828540ff4de2f1782fc85124463070b2fef65d413361e8c0e4dfac481680b7db77d39b0fde3a1b2ea07dd384ffd443aa4ffaa41cc6c9f0dcd728ab5b997ceaba1716cd52d29c4caaba9357845da3c608701c5d62b825c62d196fe55b223b29ddea1a0dc26bcba48239177a3255a9d633e2e163ee0239d37c10b7448512c2f076cb75baaba9de8a84f76c34a06883f0f9bf1d9fde8a1d86348db5539526e82f24214bb4e904acb76bef3c750103784a5241dae661d42ea3ea2a36fc9250f8c2abf3773a08620949f3c223a484a3ff7a33ea6e3233490c9abeccec91584872fdeed9aa3068100ee052b5b31d37df5efedf4ae85d37d4a3e3493551069630ffc0e16517634a21e8f82bb1435d6971dcf71d5134be42a087759958b9", 0x1000}], 0x4, 0x0, 0x0, 0x4000}, 0xfe3}], 0x1, 0x800) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000480)=r3) r5 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000002c0), &(0x7f0000000300)="99114950b0fbe20d8f964eab5d327b85eabe78", 0x13, 0x0) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) keyctl$reject(0x13, r0, 0x8000, 0x10001, r5) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002e00)={'vcan0\x00', 0x0}) ioctl$BLKPG(r6, 0x1269, &(0x7f0000001a00)={0x8001, 0xffffffff, 0x8, &(0x7f0000000400)="257ec1835ebd7bd3"}) sendmsg$can_bcm(r3, &(0x7f0000002f40)={&(0x7f0000002e40)={0x1d, r7}, 0x10, &(0x7f0000002f00)={&(0x7f0000002e80)={0x6, 0x10, 0x9, {0x0, 0x2710}, {0x0, 0x2710}, {0x4, 0x437f, 0xfff, 0x9}, 0x1, @can={{0x1, 0x2, 0xfffffffffffffff7, 0x6}, 0x8, 0x2, 0x0, 0x0, "ad1e54e34ac29689"}}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x40810) sendmsg$nl_route(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getneigh={0x14, 0x1e, 0x0, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000340), 0x4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) write$binfmt_misc(r6, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00@\x00\b'], 0x4) setsockopt$sock_int(r3, 0x1, 0x1f, &(0x7f0000000500)=0xffe, 0x0) 07:22:10 executing program 3: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x15) r4 = dup3(r2, r1, 0x80000) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000840)={"697036746e6c30000000001000", 0x1}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x9, 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300)=0x8, 0x4) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000800)) write$selinux_attr(r4, &(0x7f0000000380)='system_u:object_r:tpm_device_t:s0\x00', 0x22) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r3, 0x10000000800, 0x0, 0x0, 0x0, @in, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}}}, 0x118) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x5, 0x1}, &(0x7f00000002c0)=0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) unshare(0x40000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x4200) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @dev, 'veth0\x00'}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) io_setup(0x3, &(0x7f00000008c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000e80)=[&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f0000000d80)="34f4aae2fffef9ca58b8b3d316bd758614c0753414fc77ec0f7b1fa855cdc157ae170a47b510fb3f3a6171cfdadb96d6ef3169f15571f3257560f62a64a7a5be2f37d0b89e2ca7be5d837f14b41e67ad18f43f034fe51fb58cb8cd89048da30911136b516f2731abb65403637798", 0x6e, 0x7, 0x0, 0x1, r4}]) 07:22:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0500000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:10 executing program 1 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000380", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 312.617990] sched: DL replenish lagged too much [ 312.746633] IPVS: ftp: loaded support on port[0] = 21 [ 312.807745] FAULT_INJECTION: forcing a failure. [ 312.807745] name failslab, interval 1, probability 0, space 0, times 0 [ 312.840287] CPU: 1 PID: 8624 Comm: syz-executor1 Not tainted 4.19.0+ #87 [ 312.847146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.847170] Call Trace: [ 312.847216] dump_stack+0x244/0x39d [ 312.847240] ? dump_stack_print_info.cold.1+0x20/0x20 [ 312.847275] should_fail.cold.4+0xa/0x17 [ 312.847303] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.859343] ? pick_next_task_fair+0xa05/0x1b30 [ 312.859365] ? rcu_read_lock_sched_held+0x14f/0x180 [ 312.859391] ? zap_class+0x640/0x640 [ 312.868194] ? print_usage_bug+0xc0/0xc0 [ 312.868219] ? find_held_lock+0x36/0x1c0 [ 312.868242] ? __lock_is_held+0xb5/0x140 [ 312.868261] ? __btrfs_cow_block+0x1088/0x1250 07:22:10 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0xfffffffffffffffd) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x8811, r0, 0x0) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000040)=""/107, &(0x7f00000000c0)=0x6b) pread64(r1, &(0x7f0000000100)=""/128, 0x80, 0x0) add_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffffa) [ 312.868288] ? reweight_entity+0x10f0/0x10f0 [ 312.868306] ? perf_trace_sched_process_exec+0x860/0x860 [ 312.868335] __should_failslab+0x124/0x180 [ 312.887143] should_failslab+0x9/0x14 [ 312.887166] kmem_cache_alloc+0x2be/0x730 [ 312.894928] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 312.894950] __kernfs_new_node+0x127/0x8d0 [ 312.894971] ? trace_hardirqs_off_caller+0x310/0x310 [ 312.894989] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 312.903112] ? _raw_spin_unlock_irq+0x60/0x80 [ 312.903127] ? __schedule+0x168a/0x21d0 [ 312.903142] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 312.903158] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 312.903198] ? zap_class+0x640/0x640 [ 312.903216] ? zap_class+0x640/0x640 [ 312.912195] ? enqueue_task_fair+0x24d/0xa50 [ 312.912220] ? find_held_lock+0x36/0x1c0 [ 312.912248] kernfs_new_node+0x95/0x120 [ 312.912269] kernfs_create_dir_ns+0x4d/0x160 [ 312.912307] internal_create_group+0x5fc/0xd80 [ 312.912334] ? remove_files.isra.1+0x190/0x190 [ 312.912367] ? up_write+0x7b/0x220 [ 312.929973] ? down_write_nested+0x130/0x130 [ 312.929989] ? down_read+0x120/0x120 [ 312.930020] sysfs_create_group+0x1f/0x30 [ 312.953596] lo_ioctl+0x1307/0x1d60 [ 312.953620] ? lo_rw_aio+0x1ef0/0x1ef0 [ 312.953639] blkdev_ioctl+0x98e/0x21b0 [ 312.953657] ? blkpg_ioctl+0xc10/0xc10 [ 312.953676] ? lock_downgrade+0x900/0x900 [ 312.953693] ? check_preemption_disabled+0x48/0x280 [ 312.953712] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 312.953730] ? kasan_check_read+0x11/0x20 [ 312.953748] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.962835] ? rcu_softirq_qs+0x20/0x20 [ 312.962866] ? __fget+0x4d1/0x740 [ 312.962890] ? ksys_dup3+0x680/0x680 [ 312.962920] block_ioctl+0xee/0x130 [ 312.962936] ? blkdev_fallocate+0x400/0x400 [ 312.962955] do_vfs_ioctl+0x1de/0x1720 [ 312.962977] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 312.962995] ? ioctl_preallocate+0x300/0x300 [ 312.971792] ? memset+0x31/0x40 [ 312.971811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.971829] ? smack_file_ioctl+0x210/0x3c0 [ 312.971844] ? fget_raw+0x20/0x20 [ 312.971860] ? smack_file_lock+0x2e0/0x2e0 [ 312.971876] ? rcu_read_lock_sched_held+0x14f/0x180 [ 312.971903] ? do_syscall_64+0x9a/0x820 [ 312.997071] ? do_syscall_64+0x9a/0x820 [ 312.997094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.997112] ? security_file_ioctl+0x94/0xc0 [ 312.997135] ksys_ioctl+0xa9/0xd0 [ 312.997154] __x64_sys_ioctl+0x73/0xb0 [ 313.024981] do_syscall_64+0x1b9/0x820 [ 313.025006] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 313.032765] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.032781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.032801] ? trace_hardirqs_on_caller+0x310/0x310 [ 313.032818] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.032837] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.032860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.032884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.042022] RIP: 0033:0x4573d7 [ 313.042041] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:22:10 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000002880)=@buf={0x47, &(0x7f00000017c0)="cc0d5dc431937012ab94b41678808f8775a589ca394c01b79e95b1cab036b1755a527051ec611c018f9faa0cc493c149551b3f75fd28e170409994ce0505ddf4a6f8bf32bcc1db"}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001600)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001700)=0xe8) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xa0, 0x7, &(0x7f0000001540)=[{&(0x7f0000000140)="74bdc782f302a1943b4288a7a7d6f2ae2e7c9d15ef5df399fd8e3337afd21b683e88718ec0a5564230f463294b3640049b3a686b5a8e16771483a21c756a052d9fedddc77a49af289afffff5c0475283167e58401bd8e3d6e90e92ee65af7928784510abc19473a978f1d1f68fa2adf6e53c2d5061129103de280354ebe1b96ecdf1306c776ea03dd20e1af99ffcea5d407c549e6688138947aa02c99b884c4f9a52fc67f95d787cd8d0ee5999f90e7b93fb71f27b5e0f09437c8e9772448a545784957ab1ce4ae4afc02180379afb24170b36f11cf372cf30541097209bc26c65e67ca086cdd7ae2630aeb27feb460c79edefe1f48f6b03", 0xf8, 0x5}, {&(0x7f0000000240)="dbbfd0a007ad993b9a925891cb093c7c976464f93c84f67bebe67c1c6f087c05959858b29aa84055b545f0066d3f11dc645b00ac161263a5d1751b62955c9543dbc26727fac4", 0x46}, {&(0x7f00000002c0)="848679e67f54a0fbfe59a8ad08e4e85d2d95ea36cc4ccf5fd74bd8a4b74f25f638879872532a896e1532706bc7ca258f38302a23903ef5705fca2610318e5d124081dcc6714132030036a66d7c0bf9e9e82da34dd3dd22bbe02c60c74a99bebd2d57f440c784847ceb695fe8c88e6043249e661bdf92383d520e8a39163a263ceef85197a518b2ed9937c5e12b0c50403079add7fbe2edbf306291ccd855d3d21a7e593d4020843f9d18eb9085b277d623aed486ea14e4f04d37ca7775fc55134703eeb10255254c16686b10a105cdc0fb89d1", 0xd3, 0x7fffffff}, {&(0x7f00000003c0)="1a1aadb5f7a265db5af4596daf65f0b9ee3cc448d4c106d1e70855d3fe262d2a3cb8b29dbeb22085c676809a4d2e0f37597c0d65a3647eeea346d794fd9feee3ef908c8f33204318b26a62bebccbe5d632ea86d5c954efd6fbc5b84a136c74a05f2bf370c57934c55df8a950fe75413b94d4aad37c45ae7bb44f08ac4db05e406c7b01b9303bb1bacc2b1d3e93c3024ad5dd88246ca7806d86d83045105f12d8d99985f0e6d2944b580ce29a4fe31168621a8e111da8671f88d5852a5c3a7598ef4605f03c1bd6ed544f80534843ebd876da1f6e5a67cef38f3d877e9c1695c461740c10cf322967825b0660", 0xec, 0x2}, {&(0x7f00000004c0)="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", 0x1000, 0x6}, {&(0x7f0000001880)="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", 0x1000, 0xa0}, {&(0x7f00000014c0)="0e7395fb2382a61d9c232cd6f96dd0f35b6d8db39623b0f50dc8f6e7ebbe0d64f729a0b7e7944515b7bac1ffd583baab6b4450fa5e3dd59d8cfa4cc346885b61b99feed4ba0fe934f412", 0x4a, 0x426}], 0x400, &(0x7f00000028c0)=ANY=[@ANYBLOB="756e695f786c6174653d302c6e6f6e756d7461773ec0692c3d302c747a3d5554432c66756e633d4b45582f435f4b45524e454c5f434845434b2c646f6e745f686173682c657569643cb6b29936918da9501c026ef17c788e0a302267adc335ec83dd3eb5b1655e3c75401e6c75822bc58329efcc58260e49ed96d1ec95a3873d357402d38f8c45e49ec8c3aaf30e6382c1d96e874b577a557107e045d745b80dc9ba88fffa6853c600098119ae0b74c104ad361b0b4effc16dcc9fd077378c0100008055a29d6e0000", @ANYRESDEC=r1, @ANYBLOB=',obj_role=,\x00']) sendmsg(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002011f001cfffd946fa283005b580a000900020008fffffffffff4000404ff7e", 0x24}], 0x1}, 0x0) [ 313.042049] RSP: 002b:00007f70449b1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.042065] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 313.042074] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 313.042083] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 313.042092] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 313.042102] R13: 0000000000000000 R14: 00000000004d8258 R15: 0000000000000003 [ 313.451784] IPVS: ftp: loaded support on port[0] = 21 07:22:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x541b, 0x7fff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x4, 0x5, 0x8, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={r3, 0x4}, &(0x7f0000000100)=0x8) 07:22:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0040000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 313.846200] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 313.855435] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. 07:22:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x1e, 0x6, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0xa, r0, 0x5b64}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000005c0)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x3) inotify_add_watch(r1, &(0x7f0000000680)='./file0\x00', 0x2) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x22000000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x440, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f00000000c0)={0x9, 0x6, 0x7, 0x3ff, 0x5, 0x100000000}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000001c0)=0x24e) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={@remote, @remote, @empty, 0x5, 0x2, 0x9, 0x500, 0xfff, 0x40000, r3}) [ 313.931923] FAT-fs (loop0): Unrecognized mount option "nonumtaw>Ài" or missing value [ 314.051324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 07:22:11 executing program 2: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00003e2000/0x2000)=nil, 0x2000}, 0x1}) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000001040)=ANY=[], 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000400)={0x8, {{0xa, 0x4e21, 0xa425, @loopback, 0x80000001}}, {{0xa, 0x4e22, 0x9, @loopback, 0x7}}}, 0x108) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002a9000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 314.095858] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. 07:22:13 executing program 3: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x15) r4 = dup3(r2, r1, 0x80000) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000840)={"697036746e6c30000000001000", 0x1}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x9, 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300)=0x8, 0x4) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000800)) write$selinux_attr(r4, &(0x7f0000000380)='system_u:object_r:tpm_device_t:s0\x00', 0x22) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r3, 0x10000000800, 0x0, 0x0, 0x0, @in, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}}}, 0x118) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x5, 0x1}, &(0x7f00000002c0)=0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) unshare(0x40000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r5 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x4200) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x2, @dev, 'veth0\x00'}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) io_setup(0x3, &(0x7f00000008c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000e80)=[&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f0000000d80)="34f4aae2fffef9ca58b8b3d316bd758614c0753414fc77ec0f7b1fa855cdc157ae170a47b510fb3f3a6171cfdadb96d6ef3169f15571f3257560f62a64a7a5be2f37d0b89e2ca7be5d837f14b41e67ad18f43f034fe51fb58cb8cd89048da30911136b516f2731abb65403637798", 0x6e, 0x7, 0x0, 0x1, r4}]) 07:22:13 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000000)={@my=0x0}) ioctl(r2, 0x0, &(0x7f0000000040)="6a32d5cae5f7626da747c4c6832607b7d8cd561efbb2807eaffdfb") ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000580)='ip_vti0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000580)='ip_vti0\x00') 07:22:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) gettid() lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="041c7adf6086dd25199233d2610fced8d51bd9eea134449a982a620249c93e7e9c84324d62bc9e099d746d96740df0c3b9d41bd54df4e8201ef7b3012b93a3340223480a6d01dd50d85d995d79d15b433518639a826fd773757e7527c552588717c5f9c1427c8a85b5338606091336a39e4c047a3708816ac3f0599ce1f885ca92bdc25d63762fafa8159ff7c97085b9f373e9ae32583621c23536b26e9077a8b4d498a3ac719bb40ef33298d8dc6bd098ef87da31afa47b19a81e8e5ca9ca95d8565b5d4739885639dd510d8bce0b1240280775eb5ebaa64c16be8fa1b132e5ded3c861776db3c1accc7b85f413cd2bb064412b2498f03f419be3dbc543fbd79375e400fb1e9852c26759b34703ac7df3dc30c2349f50e79177b8f6035961dd815dbc89f9825b5d083b2ac64b92272c52aa52be9aef04d393f5fc8fbf816690fbbf1ab41579060a046405620bacbd4b3fb8eb31584c88d93f80fcb7624490a4fc839b3d2ef651cf0255821c45342d6162592904040c8f8e8ceeb9729c7f43159676b8da4e5ff50a68d4edb9e2117c9493f4ca02ded840e0f617366ee42c94ba4ab381509c50d3eceb680303c30eac4916ce000000"], 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) lseek(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) semget$private(0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=""/172, 0xac) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280), 0x8) r1 = creat(&(0x7f0000000a00)='\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f0000000100), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x12) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace(0x1c, r2) writev(r3, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, '\x00', 0x8}) getpeername$netlink(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r4 = socket$inet6(0xa, 0x2, 0x4000000000004) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000080)={0x8, {0x8000, 0xffffffff}}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(r4, 0xc0189436, &(0x7f0000000540)={@loopback, @mcast2, @ipv4={[], [], @multicast1}, 0x0, 0x1ff, 0x0, 0x500}) [ 316.155857] EXT4-fs: 12 callbacks suppressed [ 316.155868] EXT4-fs (sda1): Cannot specify journal on remount [ 316.269843] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 316.282241] IPVS: ftp: loaded support on port[0] = 21 [ 316.288330] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 316.343742] EXT4-fs (sda1): re-mounted. Opts: dax, 07:22:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) gettid() lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) lseek(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) semget$private(0x0, 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=""/172, 0xac) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000280), 0x8) r1 = creat(&(0x7f0000000a00)='\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r2 = gettid() wait4(0x0, &(0x7f0000000100), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x12) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace(0x1c, r2) writev(r3, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, '\x00', 0x8}) getpeername$netlink(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0xc) r4 = socket$inet6(0xa, 0x2, 0x4000000000004) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000080)={0x8, {0x8000, 0xffffffff}}) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000040)) ioctl$sock_inet6_SIOCADDRT(r4, 0xc0189436, &(0x7f0000000540)={@loopback, @mcast2, @ipv4={[], [], @multicast1}, 0x0, 0x1ff, 0x0, 0x500}) [ 316.367765] EXT4-fs (sda1): Cannot specify journal on remount [ 316.442725] EXT4-fs (sda1): Cannot specify journal on remount 07:22:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 316.535916] EXT4-fs (sda1): Cannot specify journal on remount [ 316.612090] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 316.627566] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 316.673283] EXT4-fs (sda1): re-mounted. Opts: dax, 07:22:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:14 executing program 2: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) r2 = socket$l2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$l2tp(0x18, 0x1, 0x1) socket$kcm(0x29, 0x2, 0x0) connect$l2tp(r4, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x3, 0x3}}, 0x2e) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x32, @local, 0x4e24, 0x2, 'sed\x00', 0x4, 0x8001, 0x22}, 0x2c) 07:22:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:14 executing program 0: r0 = memfd_create(&(0x7f0000000100)='/dev/amidi#\x00', 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000180)=0x2) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000001c0)) [ 316.894134] IPVS: set_ctl: invalid protocol: 50 172.20.20.170:20004 [ 316.939104] IPVS: set_ctl: invalid protocol: 50 172.20.20.170:20004 07:22:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socketpair(0x10, 0x8000a, 0x81, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0x5dc9, 0x1) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r3 = dup2(r1, r1) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) dup2(r0, r3) 07:22:14 executing program 2: r0 = msgget$private(0x0, 0x4000) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x5, 0x401) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)=""/120) msgrcv(r0, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4c, 0x1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x80400) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="a43e912197b1ef2f477e6207d699400877fd3dc42d39d9f7ce37c007fee2c34464a608b685709de2fcc0051c64806620927d45599837a5449218edfe713ac6594faa", 0x42) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000380)=r3) msgsnd(r0, &(0x7f0000000040)={0x2}, 0x8, 0x0) 07:22:14 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380), &(0x7f00000003c0)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in, 0x0, 0x7fffffff}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfee5, 0x10000) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000140)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000016c0), 0x3ffffffffffffed, 0x7ffffff7) 07:22:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000002d80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f5ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socketpair(0x10, 0x8000a, 0x81, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0x5dc9, 0x1) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r3 = dup2(r1, r1) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) dup2(r0, r3) 07:22:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f6ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:15 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000002c0)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000300)='map_files\x00') r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0x81fd) r3 = open(&(0x7f0000000080)='./bus\x00', 0x101002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, &(0x7f0000d83ff8), 0x8000fffffffe) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x20001000) 07:22:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="002d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="8cffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:15 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x101000, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000380)={0x0, 0xfffffffffffffffa, 0x8000, &(0x7f0000000180)=0x9}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xc0100, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000480)={0x12, 0x1, 0x0, {0x100000000647}}, 0xf) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000080)={0x7, 0x2, 0x8, 0x3, 'syz1\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0x1b, 0x0, 0x0, @remote}, r3}}, 0xfeb0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x200000, 0x0) 07:22:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:15 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000380), &(0x7f00000003c0)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in, 0x0, 0x7fffffff}, 0x90) r0 = socket$inet6(0xa, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfee5, 0x10000) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000140)) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000016c0), 0x3ffffffffffffed, 0x7ffffff7) 07:22:15 executing program 3: mmap(&(0x7f0000e03000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x8e3000)=nil, 0x8e3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write(r0, &(0x7f0000000000)="717e5f0d27d01054de6183939c8b37d6e64fbc7e429e3f0ee159d6310f83012de528787ea9b07d8e8fa83f54", 0x2c) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) setsockopt$inet_buf(r0, 0x0, 0x41, &(0x7f00008e2fba)="958e392937a186d6306a3615593baa57ff0002060000000000079ab4d5ed5cff03000000000000ffff8dffff080cf4eacc49d4df311e370043159379595d0000000000000093bffffffeffbd03ba89734f4e49fda5060255", 0x58) 07:22:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0040000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 318.093448] Unknown ioctl 1075359459 07:22:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:15 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000000c0)) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_free(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7, 0x204000) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5, 0x0, 0x0, 0x200, 0x10001, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$llc(r4, &(0x7f0000000000)={0x1a, 0x300, 0x9, 0xffff, 0x2, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x30, 0x9, r6, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast1, @in6=@ipv4={[], [], @broadcast}}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r8 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r8, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="000000000000bfcba7d85a63d02750b0afcf8d5f955e4fe953ceba"]}) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000340)={'team0\x00', r7}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote}, &(0x7f0000000200)=0x14) 07:22:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="97ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:16 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0005000000000000df63fa25f77d1089eba28e8ac8fcae7e33ffffffffc76ff7f3c0cf83fdf6c7f0ac5d95d21f23a8b588667995d3bed6bbda9d922ce4c5403001c2e9636a9456c94030c67ebaebe29e409dda1164807f0fe86146d18933fc9c503dfaab7431a1d9b6e88e9d6c24cfbfeb04df23b4056c3370978e3d88badbb6692c18bd482a4ff9c571cafd63d41df0fa7aa2d843bc9401175a6f5a383c80376855ccc4857cb9cab1b599cc3a25df9bcaf1b4aa3ed7226638b6200a461bc7356d5c98c2938c80fd876715075888653797315de945e23c5c56b697f9742d92b0e4e8b88af04a845695e463d19b7533a2ae771d2c0dae76f70e0a3b4efde93f5b72879bb2c203e537122c440639f1c3b52f87809e784a"], 0x10}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x4000000000002d0, 0x0) [ 318.497042] llc_conn_state_process: llc_conn_service failed [ 318.535823] llc_conn_state_process: llc_conn_service failed 07:22:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0500000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:16 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r1, &(0x7f0000000300), 0x0, 0x8000, &(0x7f0000000400)={0x2, 0x4e22}, 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0)=0x2000000000003, 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f02726f75f0000000000000", 0x2761, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000440)=""/4096) write$cgroup_int(r3, &(0x7f0000000000), 0x12) sendfile(r1, r3, &(0x7f0000000100), 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) r5 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000003980)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f00000039c0)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003a00)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003b00)=0xe8) r9 = geteuid() r10 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000003d40)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000003e40)=0xe8) r12 = getpgrp(0x0) r13 = getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004500)=0x0) r15 = geteuid() stat(&(0x7f0000004540)='./file0\x00', &(0x7f0000004580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000004640)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x8001081}, 0xc, &(0x7f0000004480)=[{&(0x7f0000001440)={0x1288, 0x42, 0x1, 0x70bd2d, 0x25dfdbff, "", [@nested={0x7c, 0x19, [@typed={0x8, 0x2b, @pid=r4}, @typed={0x8, 0x61, @ipv4=@loopback}, @generic="34d4170d2780456cecb73823a14c849e4c99c47c7c544d299a146ffb7e29db9c9899c5b82b277cb618d2bc0f7e22f9cd41d2e8cc91f6e9658e929b6237b76d520e1d757cbe43b08c6dbde192a9e6565ae4bd27952dab9aa067fde454237d1673c935d0d30c35ca"]}, @typed={0x8, 0x49, @u32=0xffffffff}, @nested={0x11f4, 0x32, [@generic="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", @generic="389123ebfb7d25ffcb5ed717b86f26da16dfed438fdda264ec64851ba5ef03dbdcdc129140b588d14c7926b367e72bfa7cfbcd2388eb6233d00a49b5d392e1d182ba23c5472ca6c2178580e4a7b7ebbf86699838187ac239350f17152db138fc19b8191dd0a146d6e13ea28bc8ebb3a8cb011667e3e529d580e7ccb1874c4be231ce13ff5d3763b433926642b614a293a63707d2e1bf6c07a37c206b7bd52c158f3c02d3f82aa27de1c7279826d73666798c1cef90761faeec85c9c4bf6ab68454dd28ee76290d9fb700c810b125d5ed854b712032a71cd5dc23f0373506c443b7dd68de8ce04a4ad47765d2d73021d0b5", @generic="96d90eeb255bdb5deab291a89951461503bc617257546ea9d10b82dd48334e0c3af294c5360ebc30af32c326", @typed={0x8, 0x82, @ipv4=@loopback}, @typed={0xc, 0x69, @u64=0x7}, @generic="dfd54a632eec00f68b9b33dc19a29c510f30dc670398c250de84f9e40e8b0558ebcff382d59c726e95fb80e9857eb8ee9a1d2c751912e7eedc43b6feec7649c7971c4d88a7badaed3c97dc4bd0e295c30d053b8eb567cf4d7a5133efc8de6e368f20145952fc02bf459cffbbba347cb3f721ad6c808365430313223b4144f8720cfca21ffa8d92bfcfe7087ec7df5ea0edd9d9e2ed6ff819adcfa03a0b999aa87b5a114b5cef288655e19d6ec5a84cc967e44aa50346e7a734bfa0f3e0be"]}]}, 0x1288}, {&(0x7f0000000200)={0xf0, 0x1a, 0xb04, 0x70bd2c, 0x25dfdbfe, "", [@nested={0x68, 0x3e, [@generic="8796c200f2c1e5a0e4bff69690c0fa4b1088269ca5b9c88eeb854769213b666c00488d0aa9df8ec49ad22819a3246c78c3f7b926dc9689fae20170f461348bd1b6c3e6acf1fc77894e833e0fc628e3a4522039d2641deec3cbefd4f7b3744895", @typed={0x4, 0x84}]}, @typed={0x8, 0x17, @u32=0x800}, @generic="a085bc1004bb113ebb8828ddd517357d6eb2c20f36db1db87f7ffc1c31f2dd881bdab0ae886b0bad355ec0e54feb64f0b4df87b98b612f385229e7c0cffd726f4ecd3ae29dc75fff83cfbd5db47f2e31afef468750c57a305c77e43692991e823bc34cea2797eb254a9d7e26953022"]}, 0xf0}, {&(0x7f0000002700)={0x126c, 0x14, 0x400, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x78, @uid=r5}, @generic="5afdccc7897e6b3fb2de4330268cc7dba577bc3b872815e1e82bd50596c3cc31a08b315e74d12e300daae6f6f9c1df73f395dfb423e2fec6125644025c87f8d783ce8964cc552a2d2aaba92032276b8b21fda070c840f21ce5d406d3842596aabebda7e3e716d50182250622c78b54af92da5884ac", @nested={0x11dc, 0x5d, [@generic="8550ed05a65cc2b31b1d692650b3f6fe362f26e59b72f59c311fcef9b3c2e4c34840c8fe86cc7b1ab098dbe0a6deee4f3befc461bec86bbc186eb3aae5a711f4f4d048df745f8a0672d4dd17f547c0ef0a22247ee5198586a55c0f807148c493c6c8cb006950ebc05d4f25d17691b006b58006734d36eeea9e70780f8bc014ce1dd23dee5e395c1e417e41595fce5d328949e1f0b994240aeb638b426441a265793f95837d817d2aeea9a175f938d73256927eba60325ccc4bb22e3a578058a173e657c45508a2f45ca2173e4d6c0f1e73288752f3b7db72974ce7108c336ff896cadd2f3563121a3689f9734c481c", @generic="5331dec91846f5e45991f37e4f3b5c84d7cf0dfbd5c2b98d847993be2808c1e96ddcc9724b97aacf92b1bc9171c6b2a601db3c847bb1006752e46081189fd369d7014f8e6a9295cc087c6562eff20b4d2d80e9e6a541d44eec225ca7b748cf1188c75e707cbcf9505cf9f1a6f6485a15d059dca5ffd472094dc45ff90250f4f5011d2a5110bbbecfbe739fb0734dce147f89420b93a369cca228", @typed={0x8, 0x7e, @u32}, @typed={0x8, 0x53, @u32=0x8000000000000}, @generic="e72d1e257dc1818e399f9da4c2b52577b6cbeea2fb49a0585fc8ac61079c0e74876bdbf827997b9d5c61d3564077d37d220d10e1", @generic="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", @generic="6a7abbc2937895cf97"]}]}, 0x126c}, {&(0x7f0000003b40)={0x1dc, 0x1e, 0xc08, 0x70bd27, 0x25dfdbfd, "", [@typed={0xc, 0x68, @u64=0x7fffffff}, @typed={0x8, 0x4, @uid=r6}, @typed={0x8, 0x18, @pid=r7}, @nested={0xc, 0x6a, [@typed={0x8, 0x7e, @uid=r8}]}, @generic="294b5ae6ac897156586321cc15346b4d3839b1393e244e54b547b3081a89e02cb23c9984f968e73f73aebbae632a8e43dd21673d0c59d0626a8356c372ccdd0c4945891061516fc36a8f76119d40780b8d56733042f96bc955be86edf9c2dfa92a464fbc97d80258c704f6450a15e6c2ba4360988947664fe61dd1cc2d80277bd22f671ec07d861c0e3e51b120ea27ef5a6f5e50a8c83baafe4fdf768d7ba37cbf78cfd0737149a4e603592f0e879450b2f677adf1060a312bfee5da66a15d07e9fc582d49766a6e24ba9bebf155c8eecbcc1dc0681d688951b1b3", @nested={0xc8, 0x3f, [@typed={0x8, 0x49, @uid=r9}, @generic="5b0db2a6ff3288a5405601930b0eeab44b6c4ba91de6afe95ef5df283c103b7c1d74def1e9f84b22623336933c7410bee43916d07b0cd5efcc89aad75e2de3c3d577d0b00bf12fb3d912e2fd27b94a108b12a2a31fd7eafb7fb3da871bffff6cc3bd0661caa17502249217f516125fbf5960f0794ffade86dac5b8e25736b6ee8992f1b47274c22b9e96fde078309947ad555f57535be98319c7226f249e0de35d63f56e31a1c0839fb6f43b1adfb82cb255ef8fe94ec5ce39363c"]}]}, 0x1dc}, {&(0x7f0000003e80)={0x2d8, 0x42, 0x308, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x160, 0x77, [@typed={0x8, 0x19, @pid=r10}, @typed={0xc, 0x49, @u64=0x1}, @generic="bdedd1fe8bd89e52ab763583057ecb6412035c2d684a397ad8b8e2d45e25955a809e63fed76e9f", @typed={0x14, 0x31, @ipv6}, @typed={0xc, 0x6e, @u64}, @generic="62a5ebd0c2d29f355e80adba3acf1f0a509561d0d6a9ff346dc78870c21b20282edfd5e0505dccc92e5536ae140fa8a4816984beb28d025267519f9d2dfd40ac63d69e506f7cb7651e858a69a918d9b61ac627c68f620dac8085ef7da6c7f26b80cfe2398e2d0c676b5cd823f60713767ce211a477647c8b2198272fcdd83232d4e6f9f7daac526b0d1338a910853910d90851c66edee45f4936d4c63dd78291c50d56ce6fdc2c102e7013f8c6ca99a025", @generic="6c15ef84b0b2de62733c48d2d602c1a68557773a0170a4fea753bbd2ab642d35a63ba7cf63cc7ce93989cc9f481fbe122845a5d6a33d7c8d1fac3151c936cd95a8027787076dda7a5a925585998f7f"]}, @typed={0x8, 0x45, @fd=r1}, @nested={0x12c, 0x22, [@typed={0x14, 0x19, @ipv6}, @typed={0x8, 0x79, @ipv4=@multicast1}, @typed={0x14, 0x94, @ipv6=@mcast2}, @typed={0x8, 0x3b, @u32}, @generic="5d64607f4a147415fead4c9e938a77635279de1e6996167c4cbbf98d05c1a67a6aea29ab7ff1b23aad29bd0cf5d206cca6222379ca1b3284e68063715b68eb6a3046d3c1d787b0c1", @generic="a69712988dd88dcb9ca65ae6ff70dc8c6bc28c6b8e914e08fd561931293346b4338690f684641746efe69dc54db55982eeea1ffb85a87af0d4dd26ef91afcc24b6e719b3b590cc012b4431421ae66095a24b5839ea9d661e25a3ed452d799db90aef9f40cfd9236d215f5948d7df5af5987526240d5ce2b5f3203c30c0d3394abfabc424eab97bd55e4d2eb2ae129df5a0bc899dd69df9e9b0c214990b2ae2a6a53a39f999"]}, @nested={0x34, 0x25, [@generic="e18e196fd4aabf14587a3a", @typed={0x8, 0x33, @u32=0x80}, @typed={0x14, 0x30, @ipv6=@remote}, @typed={0x8, 0x24, @uid=r11}]}]}, 0x2d8}, {&(0x7f0000004180)={0x20c, 0x12, 0x0, 0x70bd26, 0x25dfdbfc, "", [@typed={0x8, 0xa, @u32=0x8}, @typed={0x8, 0x37, @fd=r1}, @generic="8415bf1f2391cc82a2c80993cd612cd665ff8f975f02349b88fb0df4c8c3e1a10ab0dff36008fbd91564ee41c754f7399df412c618cefcb054f9692b1cb00b62c661bd0f1cfcea51dd34581f12717f7f455ac49239fce19368d183af6d09a6104c8151497c61f47d45024bd50569e4495acdf22fd87e6c5db52cab4e22d8c92bc6634d613f3e553ce316f85e4b57d4ce41af24c1714b31c68133f59555171ded9ff9679473657794dbba0687f9bc4094fa3cb68910b0adcb2194c44b565ed7470b0daf9b4e21", @generic='5', @generic="db65f6d19f1aebaa54a1ac8f8cca605a20503a5825456279ddcd02f739d58ab35b4e0a8406bc4ad48e235c15e73c8c51bad2b5fc14390386b8c5e84e7fa00e6d22d9acbc561c8bc545b4464dbefa8e794ec49d31cd", @generic="a5d5f67310accfb3556988381c486cccedd39780704aedb2a3e063fc295fa15767d7fa076e2b935e62643ee8575742743442d9387bfaa6d56cf46e6a65554a3bb3ecb5718fc1145f392d5df8663407d9486320c2764566bb65ff8794b207dccd3f9c9101a372d9c8bf91d41a66a31d3b63ac769b3c5fd03ea54d6c4468d3311e540124e6be63b5698f61dd98631e514def3ad5e1096cb49997b2e15083d98d270a995d8d362ecf7538057c814407481ae7c74f4e41d5ff565ae64785ea0eef956969fa27ca508c", @typed={0x8, 0x4, @pid=r12}]}, 0x20c}, {&(0x7f00000043c0)={0x4c, 0x40, 0x100, 0x70bd2d, 0x25dfdbfc, "", [@nested={0x34, 0x3, [@typed={0x8, 0x7, @fd=r0}, @generic="46e5cd1f9e5db1099925be907449c6d99b33f685452d3e943664e8db2e24", @typed={0x8, 0x39, @str='.\x00'}]}, @typed={0x8, 0x41, @pid=r13}]}, 0x4c}, {&(0x7f0000004440)={0x18, 0x1b, 0x20, 0x70bd27, 0x25dfdbff, "", [@typed={0x8, 0x63, @ipv4=@broadcast}]}, 0x18}], 0x8, &(0x7f0000004600)=[@rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x38, 0x80}, 0x24040000) [ 318.875252] Unknown ioctl 1075359459 07:22:16 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x101000, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000380)={0x0, 0xfffffffffffffffa, 0x8000, &(0x7f0000000180)=0x9}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xc0100, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000480)={0x12, 0x1, 0x0, {0x100000000647}}, 0xf) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000080)={0x7, 0x2, 0x8, 0x3, 'syz1\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0x1b, 0x0, 0x0, @remote}, r3}}, 0xfeb0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x200000, 0x0) 07:22:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x101, 0x6, &(0x7f0000000580)=[{&(0x7f00000001c0)="d6d8a1c0e644033c9c0e619abad14ebb323e0f8d69f60ee45f60f9ffaaf21172e768ea05b63a12edbc3b8ed0be3cbb424db715b486f00cf0a79d205318cf2802a00ff762b55569c32fde045ca34a3fd76bbb9dd53468cca0a18d7dfc33a6eb8d2e97f3ef821c1e8f6e788b1d4c728f0854f230a5aec04a143cf9fc93a6d5ac4b60aabe9968fdf5c9521481b92f7ef7dd1074f3980d6217554bb38a84201c3abe012c065f07e3e46a0b", 0xa9, 0x8000}, {&(0x7f0000000280)="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", 0xff, 0xffffffffffff8001}, {&(0x7f0000000100)="ab37eb99a8e3e09b59a0b1b1847a837a03e2a883ec6619d501ae36db6f3fb494304321884a87cba34332ca0953135c701b47f559672f1cf4", 0x38, 0x8}, {&(0x7f0000000380)="4a45a57772ddfdf91222506a524086832d0162fe4df2ef1b578ff2a58efaa588da0f7a6e5a48a3347bb587d257dc729d4f0cc35ed10d9eb925aea8e905111c8a4783181ef9702e0b490f4d283e0b579d9b23ec7cc56f8d6a0abc0e5d78881b5d2422377bf41598329e7ff542a85ba43d87e1fffa5841ef56b516", 0x7a, 0x6}, {&(0x7f0000000400)="40c4b03bf49a00c145a88f4a7e658f25d70eaa19f443ba588377b40e28a5ec03f1781063609ee003fdee1490ad53dcb174b462d0e61750029a56df4fdce88fdde848ca1da50aed71e58ad3", 0x4b, 0xfffffffffffffff8}, {&(0x7f0000000480)="f3ed9b14864919ebc5ed7e771620d88ff3e39724b23dfea4ff2e84c06ec3af3bff98be7a63b0a54a2055069de0903781b35a93357cfbd846283cd685fc9c11133573dd8ca90f28960db35351afb57b09499e91836ef5a9ce57c2924f64e7906c6cc0b34e35e8d5940277f0372dad6cb65f5c51cf332b542029fb05cc4b5a245aa5c0dfa2e4963580004b414af65e21e082a16babd4139846ff1b2c18aa4d76462d65db1d31ef38596a8dad3b059b31a41fce4ecaf870640fb476aa9f81ae554a17761b33b035e3", 0xc7, 0x4}], 0x1026, &(0x7f0000000740)=ANY=[@ANYBLOB="8a726a71440a00002c646973d25bc4529792999b2e679a636172642c6e6f616c6967050066696c6573747265616d732c696e6f646533322c6f626a5f726f6c653d73653d000000000000000000000000000000", @ANYRESDEC=r3, @ANYBLOB="2cfab7fb355ec6ddb22c00"]) write$cgroup_int(r2, &(0x7f0000000040), 0x12) fsync(r2) fallocate(r2, 0x0, 0x0, 0x6) fallocate(r2, 0x1, 0xfffffffffffffffc, 0x10000) 07:22:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0600000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x8, 0x1, 0xffffffff80000001, 0x7, 0x0, 0x6, 0x800, 0xa, 0xfffffffffffff801, 0x36, 0x2, 0x0, 0x5, 0x100000000, 0x5, 0x8000, 0x5, 0xfffffffffffffffd, 0x0, 0xffffffff, 0x8c6, 0x7f, 0x26, 0xfffffffffffffffa, 0x7, 0x80, 0x401, 0x3, 0x3, 0x1, 0x5, 0x7, 0x8d12, 0x1ff, 0x2, 0x100, 0x0, 0x7, 0x0, @perf_config_ext={0x80000000, 0x1}, 0x4000, 0x7, 0xc4c7, 0x7, 0x6ad191eb, 0x4, 0x57}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x400, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000380)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0xb8, 0x0, &(0x7f00000003c0)=[@reply_sg={0x40486312, {{0x4, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}}, @dead_binder_done={0x40086310, 0x3}, @acquire={0x40046305, 0x3}, @reply={0x40406301, {0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000300), &(0x7f0000000340)=[0x78, 0x18, 0x78, 0x38]}}, @acquire_done={0x40106309, r1, 0x1}], 0xac, 0x0, &(0x7f0000000480)="d28edaad2a1bd666b32707ee2aab40a02f136ca233228f9a89f4d09ea50f9167d77d40570ee6257c6f6d27005c058fe7dfaf2b4e4d76b9821c38d7cc4ae199b0d4c08b9b2033914a56a743050660be91b44337599ceb375f768bd80acbbba6e080176292dad5b2511de17da51c40743f59c495f1f9d816878b9c08e32cd59fe2ee42966339ab535b3fbabd25f8081ee79ef3e24b940c5a0e6ae2a4d2d9bc29ed2650b0f036935c99182c0de6"}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x24}, 0xfffffffffffffe90) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffffffe0, 0x400) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000140)={0x0, 0x4, 0x1, [], &(0x7f0000000100)={0x990964, 0xfffffffffffffffb, [], @p_u32=&(0x7f0000000040)}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000020000000000000000000791208000000000008000000000000009500000000000000"], &(0x7f0000f6bffb), 0x0, 0xfffffe21, &(0x7f00001a7f05)=""/251}, 0x18) [ 319.024482] Unknown ioctl 1075359459 07:22:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:16 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) sched_setattr(r2, &(0x7f00000001c0)={0x30, 0x0, 0x0, 0x6, 0x6, 0xffffffffffffffff, 0x5, 0x4}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r1, 0xf}, 0x10) fsetxattr(r1, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)='\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000300)={0x2002, 0x7003, 0xfffffffffffffff9, 0xd, 0x1}) iopl(0x5) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000280)=0x10) fsetxattr(r1, &(0x7f0000000100)=@known='user.syz\x00', &(0x7f0000000340)='\x00', 0xa5, 0x0) 07:22:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @local}}, 0x0, 0x1, 0x0, "0efdd9df3d13e9d4b03677374e2cfca56772d649673d744df5f65f2d06cd3a27153e16358c74b918412ddec1f20586eaf1f404e6cf85cf4a39c419dfe2e28cb3f74ac5aaf11d120ffdcb79c93a530697"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000011c0)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x0, "6ca32c4a9d7116ef67013122f3b7bf6303b13a12e59294c02928b9a341448c6fada9112fad8a7a70a3e3ac470803835fecc7da20e7697c492e334517d1495f47356ad64305085851140dc11b3897eeeb"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x0, @dev}}, 0x0, 0x5, 0x0, "1ad2817a5e258f17dcb9fe60393b96025ef74f35659419514698b8d591bfeb96ca2be1ebf2bec434bc77de464eeed865090967b3279404b511aa9a98a91128ec729634c1893c83f5b9f02953986d6673"}, 0xd8) fcntl$addseals(r0, 0x409, 0x2) 07:22:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:16 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x20000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xffffffffffffffff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, 0x9}, r1}}, 0x30) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000240)) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000000)) socketpair$unix(0x1, 0x10000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000004, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227b, &(0x7f0000000200)) 07:22:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000080)={{{@in=@rand_addr, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) ioprio_get$uid(0x3, r1) 07:22:17 executing program 0: ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f00000009c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) accept4$unix(0xffffffffffffffff, &(0x7f0000000a00)=@abs, &(0x7f0000000a80)=0x6e, 0x800) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {}, [{}, {}], {}, [], {}, {0x20, 0x3}}, 0x34, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x0, 0x6}, [], {0x4, 0x7}, [{}], {0x10, 0x1}}, 0x2c, 0x1) 07:22:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair(0x11, 0x80000, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount$9p_rdma(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000000)={'trans=rdma,', {'port'}}) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) 07:22:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="97ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 319.863621] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 319.887028] NFS: bad mount option value specified: port=0x0000000000000000 [ 319.961021] NFS: bad mount option value specified: port=0x0000000000000000 07:22:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000001, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) close(r2) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x10000) r3 = accept4(r1, &(0x7f0000000340)=@alg, &(0x7f0000000040)=0x80, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0'}, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x2e11}, 0x8) getsockopt$sock_timeval(r4, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) shutdown(r3, 0x0) write$binfmt_misc(r4, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmmsg$alg(r3, &(0x7f0000000700)=[{0x80b80000, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)='C', 0x1}], 0x1}], 0x1, 0x0) 07:22:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f00000000c0)="36424f6433ff7f673e660ff7cba2ebf717c4dc7518fff30fbcbb0000000096722ba5a5d40000006151ddb52ba38a4d5149b94599a2e12226f242d64a595dc422c5aa717ae56736d1b2") sync_file_range(r0, 0x8, 0x0, 0x6) [ 320.081014] ntfs: (device loop0): parse_options(): Unrecognized mount option ./file0. [ 320.145662] overlayfs: filesystem on './file0' not supported as upperdir 07:22:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0300000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000780)={[{@hostdata={'hostdata', 0x3d, 'obdevprocGPLeth0eth1Bvboxnet0vmnet0bdevvboxnet1posix_acl_access1}}(system'}}]}) 07:22:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007a80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:18 executing program 3: readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) futex(&(0x7f0000000080)=0x2, 0x0, 0x2, &(0x7f0000000140)={0x0, r0+10000000}, &(0x7f0000000180), 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x1d, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000100)}}, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 07:22:18 executing program 2: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x20000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x99, 0x0, &(0x7f0000000100)="a1472f5bc606769aa268320cddf576e46abcca67918ec7c90a9e4b8d4911540e7f9021cb553e5012282d2b50f4735c17f9446518f5ff444f7880986cf956ec213b42f1b42fb845ea4e7a5cf698268138c22511a2b293728748ca684c6bcfbfc974ecc15cf94f8ddb3186c1912f7b125e75ffac6a2cab835acd1398853d75d37983aaa7df30438b794bfb4609871484278baab82612e4315465"}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr(r1, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='ppp0\x00', 0xfffffcef, 0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(0xffffffffffffffff, 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000200), 0x4) symlinkat(&(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x7, 0x81, 0x6, 0x1f, 0x2d1, 0x8, 0xff, {0x0, @in6={{0xa, 0x4e24, 0x4c1fc9d2, @empty, 0xffffffff}}, 0x7, 0x2, 0x0, 0x2, 0x80000000}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000440)={r4, 0x6}, 0x8) listen(r3, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r6, 0x29, 0x0, &(0x7f0000000040)=0x100000000001f, 0x87) ioctl$int_in(r5, 0x5421, &(0x7f0000000240)=0x7) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x1300000000000000, {0x0, 0x4c}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) [ 320.630302] gfs2: not a GFS2 filesystem 07:22:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 320.713344] gfs2: not a GFS2 filesystem 07:22:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) memfd_create(&(0x7f0000000140)="000000000000000000000000000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6287c64dbea37a", 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), &(0x7f0000000280)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x1000000000013) 07:22:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffffd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="2d00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000780)={[{@hostdata={'hostdata', 0x3d, 'obdevprocGPLeth0eth1Bvboxnet0vmnet0bdevvboxnet1posix_acl_access1}}(system'}}]}) [ 320.991844] gfs2: not a GFS2 filesystem 07:22:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1100082) socket$inet_udp(0x2, 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) 07:22:18 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000780)={[{@hostdata={'hostdata', 0x3d, 'obdevprocGPLeth0eth1Bvboxnet0vmnet0bdevvboxnet1posix_acl_access1}}(system'}}]}) [ 321.173076] EXT4-fs: 93 callbacks suppressed [ 321.173088] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 321.202147] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting 07:22:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 321.338669] EXT4-fs (sda1): re-mounted. Opts: dax, [ 321.368150] EXT4-fs (sda1): Cannot specify journal on remount 07:22:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f6ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:19 executing program 2: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x20000, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x99, 0x0, &(0x7f0000000100)="a1472f5bc606769aa268320cddf576e46abcca67918ec7c90a9e4b8d4911540e7f9021cb553e5012282d2b50f4735c17f9446518f5ff444f7880986cf956ec213b42f1b42fb845ea4e7a5cf698268138c22511a2b293728748ca684c6bcfbfc974ecc15cf94f8ddb3186c1912f7b125e75ffac6a2cab835acd1398853d75d37983aaa7df30438b794bfb4609871484278baab82612e4315465"}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr(r1, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='ppp0\x00', 0xfffffcef, 0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x3, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) sync_file_range(0xffffffffffffffff, 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000200), 0x4) symlinkat(&(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x7, 0x81, 0x6, 0x1f, 0x2d1, 0x8, 0xff, {0x0, @in6={{0xa, 0x4e24, 0x4c1fc9d2, @empty, 0xffffffff}}, 0x7, 0x2, 0x0, 0x2, 0x80000000}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000440)={r4, 0x6}, 0x8) listen(r3, 0x20000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) setsockopt$inet6_int(r6, 0x29, 0x0, &(0x7f0000000040)=0x100000000001f, 0x87) ioctl$int_in(r5, 0x5421, &(0x7f0000000240)=0x7) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x1300000000000000, {0x0, 0x4c}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 07:22:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) bind(r0, &(0x7f00000005c0)=@hci, 0x80) 07:22:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000002d80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:19 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/31) gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) dup(0xffffffffffffff9c) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000080)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) r1 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7}, 0xfffffd28) [ 321.581512] EXT4-fs (sda1): Cannot specify journal on remount [ 321.704457] EXT4-fs (sda1): Cannot specify journal on remount 07:22:19 executing program 0: r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000940)=ANY=[], &(0x7f0000000480)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x200, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000788000), 0x4) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)="b379bdcb12034119424b34f87d72e1ff6d9b34bcb3aee8817d5b04cad1332c2de1412395cb0eb81c1c503ba4fca45f58196bf018930095279350b73dc9b779fa9fc6957760370c92c8", 0x49) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x40200, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000680)={'filter\x00', 0x4}, 0x68) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000003300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x106}}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000440)=0xc) r2 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) socket(0x2, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r2, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) [ 321.780246] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:22:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff8c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 321.861406] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 321.892992] EXT4-fs (sda1): re-mounted. Opts: dax, [ 321.931536] EXT4-fs (sda1): Cannot specify journal on remount 07:22:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003ff80080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 322.120965] print_req_error: I/O error, dev loop0, sector 0 [ 322.127024] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 322.137268] print_req_error: I/O error, dev loop0, sector 8 [ 322.143391] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 322.151228] print_req_error: I/O error, dev loop0, sector 16 [ 322.157046] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 322.164787] print_req_error: I/O error, dev loop0, sector 24 [ 322.170604] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 322.178403] print_req_error: I/O error, dev loop0, sector 32 [ 322.184272] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 322.192085] print_req_error: I/O error, dev loop0, sector 40 [ 322.197929] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 322.205690] print_req_error: I/O error, dev loop0, sector 48 [ 322.211623] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 322.219293] print_req_error: I/O error, dev loop0, sector 56 [ 322.225321] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 322.234018] print_req_error: I/O error, dev loop0, sector 64 [ 322.239876] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 322.247627] print_req_error: I/O error, dev loop0, sector 72 [ 322.253553] Buffer I/O error on dev loop0, logical block 9, lost async page write 07:22:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000002080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x3, 0x90, [0x0, 0x20000a40, 0x20000bd8, 0x20000de8], 0x0, &(0x7f0000000100), &(0x7f0000000a40)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x2}]}, 0x108) 07:22:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000004c0)) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x2) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) 07:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 322.567589] kernel msg: ebtables bug: please report to author: Valid hook without chain 07:22:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfc80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0700000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc-cast6-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="b7da122b891bfc4e2f00000000000000", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="a6c87a3b6cc7f8a908c79a22c110e4d6", 0x10}], 0x1, &(0x7f0000000080)}, 0x0) read(r2, &(0x7f0000000bc0)=""/93, 0xfffffe0a) 07:22:20 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/31) gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) r1 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) write$P9_RFSYNC(r1, &(0x7f0000000080)={0x7}, 0x7) 07:22:20 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0xff, 0x1, &(0x7f0000000000), 0x3d5) 07:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) dup2(r0, r1) dup3(r1, r2, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380)=""/4096, &(0x7f0000000000)=0x1000) 07:22:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000000)='./file0\x00', 0x0) recvmsg(r0, &(0x7f0000003180)={&(0x7f00000019c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000003000), 0x0, &(0x7f0000003080)=""/249, 0xf9}, 0x0) 07:22:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7a00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000140012000c0001006772657461700000040002000a000100ed7fc20000000000"], 0x1}}, 0x0) 07:22:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) dup2(r0, r1) dup3(r1, r2, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380)=""/4096, &(0x7f0000000000)=0x1000) 07:22:20 executing program 2: r0 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) sendmmsg$unix(r0, &(0x7f0000002c80)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300), 0x0, &(0x7f0000001840)=[@cred={0x20}, @rights={0x10}], 0x30}], 0x4924924924924e1, 0x0) 07:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0700000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2, 0x100000010507e) r1 = memfd_create(&(0x7f00000004c0), 0x4) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000080)="377097ee47690a73014428", 0xb}], 0x1, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1100082) r3 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = socket$inet6(0xa, 0x1, 0x0) inotify_init() r5 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_int(r5, 0x29, 0x46, &(0x7f00000000c0), 0x1) bind$inet6(r4, &(0x7f0000402000)={0xa, 0x4e24, 0x2000000000000006, @mcast2}, 0xf540747c9f8303b6) setsockopt$inet6_int(r5, 0x29, 0x3a, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r5, &(0x7f00007a8fff), 0x3a7, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getgid() clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) write$input_event(r3, &(0x7f0000000340)={{0x0, 0x7530}, 0x17, 0x3, 0xd5}, 0x18) r6 = getpid() fstat(r5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setresuid(r7, r8, r9) sched_setscheduler(r6, 0x6, &(0x7f0000000480)=0x5) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7", [0x9]}) 07:22:21 executing program 3: clone(0x80003ffc, &(0x7f0000000800), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000007c0)) mknod(&(0x7f0000f80000)='./file0\x00', 0x80000000001040, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000180)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000bc0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000280), &(0x7f0000000b40)) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000200)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 07:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 323.575053] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:22:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:21 executing program 0: 07:22:21 executing program 0: 07:22:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000dab80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:21 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) set_tid_address(&(0x7f0000000080)) 07:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000240)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402") removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)=@known='system.sockprotoname\x00') 07:22:21 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:22:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:21 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@nat={'%at\x00', 0x19, 0x2, 0x208, [0x200004c0, 0x0, 0x0, 0x200005c0, 0x200005f0], 0x0, &(0x7f0000000000), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000300000000000000000000000000000000000000000000000000ffffffff010000000b000000000000000000655d3000000000000000000000000000736974300000000000000000000000006970366772657461703000000000000069706464703000000000000000000000ffffffffffff000000000000aaaaaaaaaa000000000000000000a0000000a0000000d0000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000004155624ab4a3e5ee5ff5000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000005000000000000000000726f7365300000000000000000000000200000fa00000013000000000000000076657468305f746f5f62726964676500766c616e300000000000000000000000ffffffffffff0000000000000180c200000000000000000000007000000070000000a80000006172707265706c79000000000000000000000000000000000000000000000000100000000001000000000000000000000000000000000000"]}, 0x280) 07:22:21 executing program 3: 07:22:21 executing program 2: 07:22:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:21 executing program 0: 07:22:22 executing program 2: 07:22:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:22 executing program 0: 07:22:22 executing program 2: 07:22:22 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000010000/0x3000)=nil, 0x3000, 0x0, 0x100000000020011, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000500)={0x4, 0x0, &(0x7f0000000480)=[@enter_looper], 0x1, 0x0, &(0x7f00000004c0)='8'}) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, &(0x7f00000001c0)}) 07:22:22 executing program 0: 07:22:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000280", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:22 executing program 2: 07:22:22 executing program 0: 07:22:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007a80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:22 executing program 2: [ 324.864610] binder_alloc: binder_alloc_mmap_handler: 9509 20010000-20013000 already mapped failed -16 [ 324.880057] binder: BINDER_SET_CONTEXT_MGR already set 07:22:22 executing program 0: [ 324.912608] binder: 9509:9515 ioctl 40046207 0 returned -16 [ 324.928267] binder_alloc: 9509: binder_alloc_buf, no vma [ 324.934548] binder: release 9509:9521 transaction 2 out, still active [ 324.957201] binder: undelivered TRANSACTION_COMPLETE [ 324.959083] binder: 9509:9521 transaction failed 29189/-3, size 0-0 line 2973 [ 324.996637] binder: release 9509:9515 transaction 2 in, still active 07:22:22 executing program 2: 07:22:22 executing program 0: [ 325.028864] binder: send failed reply for transaction 2, target dead [ 325.067444] binder: undelivered TRANSACTION_ERROR: 29189 07:22:22 executing program 3: 07:22:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff9780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:22 executing program 0: 07:22:22 executing program 2: 07:22:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffffeb80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:22 executing program 3: 07:22:22 executing program 2: 07:22:22 executing program 3: 07:22:22 executing program 0: 07:22:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:23 executing program 2: 07:22:23 executing program 0: 07:22:23 executing program 3: 07:22:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000040080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:23 executing program 2: 07:22:23 executing program 3: 07:22:23 executing program 0: 07:22:23 executing program 3: 07:22:23 executing program 2: 07:22:23 executing program 0: 07:22:23 executing program 3: 07:22:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:23 executing program 2: 07:22:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000002080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:23 executing program 0: 07:22:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000130001020000f6b9cd679ad3c9ea0000"], 0x1}}, 0x0) 07:22:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2, 0x80000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fdatasync(r0) 07:22:23 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000001c0)) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000140)) fcntl$getown(r0, 0x9) utime(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x20, 0x6}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3, 0xffffffffffffffff, 0x2, r3}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = eventfd(0x2) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000180)={r4, 0x0, 0x2, r3}) [ 326.189022] EXT4-fs: 96 callbacks suppressed [ 326.189033] EXT4-fs (sda1): Cannot specify journal on remount 07:22:23 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x1d, 0x0) [ 326.292072] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 326.301343] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 326.352569] EXT4-fs (sda1): re-mounted. Opts: dax, 07:22:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffffd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x809}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x200018) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) [ 326.387388] EXT4-fs (sda1): Cannot specify journal on remount [ 326.459754] EXT4-fs (sda1): Cannot specify journal on remount 07:22:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0200000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 326.515775] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 326.539910] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting 07:22:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0600000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 326.570232] EXT4-fs (sda1): re-mounted. Opts: dax, [ 326.576181] EXT4-fs (sda1): Cannot specify journal on remount 07:22:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x100, 0x4) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000340)=0x100, 0x4) setxattr$trusted_overlay_nlink(&(0x7f0000000bc0)='./bus\x00', &(0x7f0000000c00)='trusted.overlay.nlink\x00', &(0x7f0000000c40)={'L-', 0xfff}, 0x28, 0x2) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000140)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f00000003c0)={0x2a, 0x29, 0x2, {0x0, [{{0x20, 0x2}, 0x1, 0x4, 0x7, './file2'}]}}, 0x2a) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000a40)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200)={0x27, 0x1, 0x0, 0x3, 0x2, 0x1, "1b3ad00e8b6a7d6c1f59da6d4bc8a3825b8800e28197c25fc900dbc33fd4df750920edd583b6560e6fb72b836a6f5fd62988d4d12fa97961e13444a73132ef", 0x27}, 0x60) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000280)={{0x8, 0x4}, 0x1, 0x3, 0x3, {0x7, 0xa942}, 0x10000, 0xf456}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r2, 0x0, 0x8, &(0x7f0000000380)='upperdir'}, 0x30) ptrace$setregset(0x4205, r3, 0x201, &(0x7f0000000540)={&(0x7f0000000440)="9672e22c1082c65856c5cb7b4ae369d2a761fa74b0f7d0471d1c99b137f28736dbda8667cd4c799de9d749525188514937db77ae3d1ede2d14ca8bae9dfbff40e43c01ce203bc9ef07959ec2f0b5ed8ade0110200c20601f3e310057118e7e18cbcbb3d279b7906236c0c945078daa2f43f3263aafef64298be6ca0de4b5e597959130b2813a77c5a8b58034490128438891cdabdca4b91c45fe13a9d84e59636db3e545cae842aa0913e450aee1518ac83759ca47bc43271da7d778f8b9ad46688e905f1a3565cce364160dddeb9f5dc197043bb75a53bffdedf04a3e3c492a4ab868df626b35", 0xe7}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000140), 0xd1) r4 = syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) clock_gettime(0x0, &(0x7f0000004bc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000004a40)=[{{&(0x7f0000000680)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000700)=""/198, 0xc6}], 0x1, &(0x7f0000000840)=""/10, 0xa, 0x3f}, 0x3f}, {{&(0x7f0000000880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000900)=""/17, 0x11}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000000940)=""/18, 0x12}, {&(0x7f0000000980)=""/16, 0x10}, {&(0x7f00000009c0)=""/64, 0x40}, {&(0x7f0000000a80)=""/164, 0xa4}], 0x6, &(0x7f0000001c80)=""/116, 0x74, 0xfffffffffffffff8}, 0xbff8}, {{&(0x7f0000001d00)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001d80)=""/76, 0x4c}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/18, 0x12}], 0x3, &(0x7f0000002e40)=""/86, 0x56, 0xa393}, 0xdeb3}, {{&(0x7f0000002ec0)=@generic, 0x80, &(0x7f0000003100)=[{&(0x7f0000002f40)=""/182, 0xb6}, {&(0x7f0000003000)=""/140, 0x8c}, {&(0x7f00000030c0)=""/47, 0x2f}], 0x3, &(0x7f0000003140)=""/109, 0x6d, 0xffffffffffffff67}, 0x5a}, {{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f00000031c0)=""/105, 0x69}, {&(0x7f0000003240)=""/56, 0x38}, {&(0x7f0000003280)=""/241, 0xf1}, {&(0x7f0000003380)=""/4096, 0x1000}, {&(0x7f0000004380)=""/82, 0x52}, {&(0x7f0000004400)=""/120, 0x78}, {&(0x7f0000004480)=""/6, 0x6}, {&(0x7f00000044c0)=""/141, 0x8d}], 0x8, &(0x7f0000004600)=""/47, 0x2f, 0x440}, 0xffff}, {{&(0x7f0000004640)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f00000049c0)=[{&(0x7f00000046c0)=""/105, 0x69}, {&(0x7f0000004740)=""/206, 0xce}, {&(0x7f0000004840)=""/146, 0x92}, {&(0x7f0000004900)=""/67, 0x43}, {&(0x7f0000004980)=""/10, 0xa}], 0x5, 0x0, 0x0, 0xff}, 0x2}], 0x6, 0x100, &(0x7f0000004c00)={r6, r7+10000000}) accept$packet(r0, &(0x7f0000004c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004c80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004cc0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000004dc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004e00)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000004f00)=0xe8) accept4$packet(r0, &(0x7f0000005180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000051c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000052c0)={'veth0_to_bond\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005300)={'team0\x00', 0x0}) getpeername$packet(r0, &(0x7f00000054c0)={0x11, 0x0, 0x0}, &(0x7f0000005500)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000005980)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000005a80)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000005b40)={0x0, @rand_addr, @multicast2}, &(0x7f0000005b80)=0xc) getsockname$packet(r2, &(0x7f0000005d40)={0x11, 0x0, 0x0}, &(0x7f0000005d80)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000005dc0)={'bond_slave_1\x00', 0x0}) getsockname$packet(r0, &(0x7f0000005f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005fc0)=0x14) accept$packet(r1, &(0x7f0000006000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006040)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006080)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000006180)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000006940)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000006900)={&(0x7f00000061c0)={0x728, r4, 0x102, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0xf4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0xfc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r12}, {0x138, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}]}}, {{0x8, 0x1, r16}, {0x17c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r18}, {0x248, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x85f1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20f}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r22}}}]}}]}, 0x728}, 0x1, 0x0, 0x0, 0x10}, 0x40004) fsync(r1) 07:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 326.821381] overlayfs: failed to resolve './file1': -2 07:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:24 executing program 3: socketpair$unix(0x1, 0x40000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="41d771184ec3364e75168fc97b2f7bc8c198268114a097ffe46d7f486ec5e40e6860bb7e6f6b5ded5f6c0eff4dd53dab1cf98c523e92df018fa79d4d2a85df2c9c6858dec806adb5d2a9ef2d7aead946ad790fc4d2d37ef81ae6f529c7907c0906e1dbc08e020d5601f528f91b7134e2bd0e9809ab98b636641b26be00afde2560d6d9b9515c6a813f84733ada4239790a6804df5d6b7a8b13d1c26c43af3d38378d42c0bf9cedb3499e90a33ea34fb35336f42323b0da449392e6f7074e0cf8b0cae5467b08e42c0e0ae4360c79cec74158c8b3d7c6d8ddc97d627d460945be702b6e88a9c3c4ebf5dad6d0e35f29b871328d67ed6f"], 0x1}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) getgroups(0x5, &(0x7f00000000c0)=[0x0, 0xee01, 0xee01, 0x0, 0xffffffffffffffff]) fchown(r0, r4, r5) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x84, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x9b) close(r3) close(r2) [ 326.895282] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 07:22:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200e69925f15af0800001d00ef6875083b001d00000000000000000000000000000000000000"], 0x20}}, 0x0) 07:22:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:24 executing program 3: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000), &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x5, @mcast1, 0x8}}, 0x99, 0x4, 0x49753eac, 0x4, 0x4}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={r0, 0x94, &(0x7f00000003c0)=[@in6={0xa, 0x0, 0x1e50, @ipv4={[], [], @remote}, 0x7}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x0, 0x3, @ipv4, 0x4}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e23, 0x6, @local}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1a}}]}, &(0x7f0000000280)=0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}, 0x4}}, 0xffffffffffffffc2) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x8, 0x5, 0x8}, 0xa) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000200)={0x100, 0x2, 0x2, 0x7, 0x10000, 0x7, 0x2, 0x1, 0x9e, 0xfff}) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') 07:22:24 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000280)={0x3, @sdr={0x75727776, 0x8}}) 07:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:25 executing program 2: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='mode') process_vm_readv(0x0, &(0x7f0000001440), 0x0, &(0x7f0000000000), 0x11, 0x100000000000000) syz_mount_image$iso9660(&(0x7f0000000300)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="87806072d8d91ac1344183e6a14e8a8360ba5a19a6041307ae796ec50a81eac83d6b9b92af779c8a11e0835ade160dd3545b2f5ba6d96aa1c95a3e2c81cee6f38ad726e903f77f07a1a66d7f379ad547949e800f8bb6acb1f3475699ed977fb48571c90a95cffcf531df897905299ea716b28922995bb09a1cc009ae341411b77e48492e2d62", 0x86, 0x6}, {&(0x7f0000000140)="50cd684b0bd3e9ca352d2de72acf39362c7cad0252ea5750c2b8e89a4b22cc4c2c7ffdd39f3b089a808b31eb40637c191169cfe693801fb673e6408ee7598e78e0cd8d1821b569c63e9605a8bc1f4bca75d9b9a79484042032a8f5a1558622e8fd9d544131783d4213f6c7d46a5a20f2d7975e3003b778a013ebaf16aee7197a93aacdef1ce0b52623125d2b07b806a2efbb2535", 0x94, 0x22}], 0xa084, &(0x7f0000000240)={[], [{@smackfshat={'smackfshat'}}, {@hash='hash'}]}) [ 327.623969] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 07:22:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0xfdfdffff}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x900, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x3, {0x2, 0x4e24}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e21, @multicast1}, 0x174, 0x40, 0x1, 0x10001, 0x6, &(0x7f0000000080)='veth0\x00', 0x2aa, 0x40, 0x200}) 07:22:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:25 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000001240)={0x2, 0x1, @local}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5c, 0x60000) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0x80000000, 0x4, 0x0, &(0x7f0000000040)}) 07:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ebffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0300000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x7, 0x2) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r2, &(0x7f0000000100), 0x8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2000005, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 07:22:25 executing program 2: add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4000008000", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x100020, &(0x7f00000005c0)=ANY=[]) request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)=']!ppp0*[(eth0[\x00', 0xfffffffffffffffe) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x82400, 0x0) setsockopt$inet6_int(r1, 0x29, 0x57, &(0x7f0000000580)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x80000000, 0x7, 0x7eb3, 0x8a5, 0x7, 0x3ff, 0x6, {0x0, @in={{0x2, 0x4e22, @rand_addr=0x1}}, 0x9, 0x0, 0x6, 0x6, 0x1}}, &(0x7f00000004c0)=0xb0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000500)={r2, 0x80000001}, &(0x7f0000000540)=0xffffffffffffffaf) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000300)={0x9, 0x9, 0x2}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000040)=0x8001, 0x4) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x4e22}, {0x306, @local}, 0x40, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 'ifb0\x00'}) 07:22:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff9780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000180)={0xfdfdffff}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x900, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000000c0)={0x3, {0x2, 0x4e24}, {0x2, 0x4e24, @loopback}, {0x2, 0x4e21, @multicast1}, 0x174, 0x40, 0x1, 0x10001, 0x6, &(0x7f0000000080)='veth0\x00', 0x2aa, 0x40, 0x200}) 07:22:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ab0d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:25 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f000028b000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280), 0x108) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = timerfd_create(0x6, 0x800) ioctl(r2, 0x8912, &(0x7f00000000c0)="113f4ec84821f3f6e211c73cb36621d07026fe000000000000") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffd, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000580)='/dev/vcs#\x00', 0x1) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa0, 0x10000) write$P9_RREAD(r5, &(0x7f0000000100)=ANY=[], 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000780)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x9, 0x794a, 0x1000, 0x100, 0x7}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000540)={r6, 0xdf5, 0x2}, 0x8) ioctl$DRM_IOCTL_MODE_GETCRTC(r5, 0xc06864a1, &(0x7f0000000480)={&(0x7f0000000180)=[0x0], 0x1, 0x6, 0x0, 0x9, 0x3ff, 0x100000000, {0x0, 0x101, 0x9, 0x0, 0x80000001, 0x0, 0x7fff, 0x18000000, 0xb970, 0x3f, 0x0, 0x0, 0x100, 0x0, "0e7653798b32d90fa451589b4c93f9e05d79e1bfb304fecea42bb5dd7b3f4fb6"}}) msgget$private(0x0, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000080), 0x0) r7 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f00001da000/0x18000)=nil, &(0x7f0000000640)=[@textreal={0x8, &(0x7f00000005c0)="0f18e60f01b808002e0f01cf0f239f66b9800000c00f326635008000000f30baa000edba2100ec66b9020a000066b87a8b000066ba000000200f30f30f092e0fc7a90000", 0x44}], 0x1, 0x0, &(0x7f0000000680), 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x9, 0x0, 0x48b, 0x1f}, 0x14) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000040)=0x7) 07:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000200)=""/148, 0x344}], 0x10000159, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0xbffc, 0xb17, 0x8}) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000380)=""/35}, {&(0x7f00000002c0)=""/96}], 0x3b5, 0x10400003) 07:22:26 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000000100)=@known='system.sockprotoname\x00', &(0x7f0000000140)='a%mime_type\x00', 0xc, 0x1) fcntl$setstatus(r0, 0x4, 0x6400) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x20040, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x185000, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 07:22:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="002d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000002080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8842, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x1, 0x5b66, 0x102, 0x3, {0x2, 0xdd56, 0x62, 0x100}}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x7, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x54, r3, 0x310, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x10000}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x850}, 0x4) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000340)={0x0, 0x9, 0x0, [], &(0x7f0000000300)={0x0, 0x0, [], @p_u8=&(0x7f00000002c0)}}) write$FUSE_BMAP(r0, &(0x7f00000000c0)={0x18, 0x0, 0x7, {0x7715}}, 0x18) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, &(0x7f0000000100), 0x1, r0, 0x9}) 07:22:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6, &(0x7f00000016c0)=[{&(0x7f00000002c0)="f14de16914a307d65cb49461880b10d49796c5ea27ec8e66cdcf873ba1f39b3a2a0945a872f7cbbf985c986b8aa023db0e46f37a8a428f431ac07087e180cf0fe07f2559883386c7882c70fa00506276ff15d800dba8de09eee53f6162ea351db3273839b1c39ae58813dfabb165b4", 0x6f, 0x7}, {&(0x7f0000000340)="cd3b31f5806772c2856ae000ef95e9504c01ee2a8bdf024c7e8126aaba65dcff4ade3b0aa7ae890db2e77b8f3294afef89d8971c287ab755f5c4fa784fad0572bf91628920839e3a5801ed91ac20748aabdfafea43d46ea2c878f0ec18ba18482b48b81aef92562d5bbebe0a9ee2b5ac20d5f8aac5add108a9372d34591f4c9047e82cda4e27bb4fef4f9edc31184e005c36ff9785dbae88deb4e508ff72095e67f1b5f657d718937ad1fb87a5a0941410df703dc29876e3af071d7d0f0300942160108c0327108216c2fedeffdd5ce1288b958a57a33fd8d592e068106e83498267078f842063fb7e57738f", 0xec, 0xbd0a}, {&(0x7f0000000440)="a59636c1b62bb1cdd686afe9561d7043d6c749c241d121d76f87d926470df6a1b2a7105d5b00a916883ad05b36a1b9a81d9bf93d677cb40fd2db799f552364b544507487bb2bed9a45aa346c38faa46445366554056b03441427070f77118bb9456270563758302049fad897efb186b76f3e424714669aece61b650ad424de8ecac2aa626c6000f3ac77aee551acb1dc576c1cdd1f198014671917601bf4855f8a948b5a6aca99db3012f338a28cea61138103f836c627ab7a8024b145940d91c366d5592f553946d562eeb5012f151c8afe8636351199a8f905d67ac13c04cf5c7ea16ad028278d49baf8502466896aa647c6e0c2d125128a", 0xf9, 0x7fffffff}, {&(0x7f0000000540)="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", 0x1000, 0x9}, {&(0x7f0000001540)="693c7af127c0263af6704fbe4f938818034e64559b5101dda3ef2ee3c0a5c4838d7bd8307c90ef85c79902ea49280dea393eb833c219a2b7c896c7e8d7da6595a59c80f523edaf489db2ae23919585f5c202fa85e8f2ca98db9140187cc33b07af6f39", 0x63, 0x8000}, {&(0x7f00000015c0)="fde0a09c6747a021e115e9c81a395e47cc022e726af77919e193647ef456bd5f52ab60164e1ae05f54c3851cd694bbd6ae2d002fc86d2580f7024cda4301e5402872c43a8a1aecf8f5869968473bbf7f848dc7ae4737cf39cf8fb1c5df83c1f4b4d9a7962d955690c24a3278f6425618a75a3a8560c64edbbb2e1b948bd83617f665825949c63162929bd7cae492c031ff0f7ec40e1a054c6f1989d09b52991755cc077cd8021680c8a22d306919020751beab62f1b389acadb6ede803d78c5c33e96f77a189265c6b880a90a37f12e41249ca6412283d9945a65c", 0xdb, 0x7f80000000000000}], 0x0, &(0x7f0000001780)={[{@user_xattr='user_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}, {@nouser_xattr='nouser_xattr'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) clock_adjtime(0x0, &(0x7f0000000180)={0x73db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26bd, 0x0, 0x0, 0x2}) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7ff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {0x0}]}) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x301800) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000000c0)={r1, 0x3}) 07:22:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x45df9c0f9907a689, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000040)={0x204, 0x0, 0x2}) ioctl(r0, 0x8912, &(0x7f0000000480)="0a5cc80700315f85715070") r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r3, @ANYBLOB="000000000000000008001b00000000000800210000000000"], 0x30}}, 0x0) 07:22:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003280", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1cb, 0x800) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000080)=0x7, &(0x7f00000000c0)=0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000698000)=0xe) ioctl$TIOCPKT(r2, 0x80047456, &(0x7f0000000000)) [ 329.130295] erofs: read_super, device -> /dev/loop2 07:22:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 329.159345] erofs: options -> user_xattr,acl,nouser_xattr,noacl,fault_injection=0x0000000000000006,nouser_xattr,fscontext=unconfined_u, 07:22:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfc80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x10000, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xfdfdffff}) 07:22:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0xefff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x100, 0x0, &(0x7f0000000200), 0x1000002, &(0x7f00000002c0)=ANY=[@ANYBLOB="8b4e647770d671"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 329.212791] erofs: cannot find valid erofs superblock [ 329.319630] erofs: read_super, device -> /dev/loop2 [ 329.371136] erofs: options -> user_xattr,acl,nouser_xattr,noacl,fault_injection=0x0000000000000006,nouser_xattr,fscontext=unconfined_u, [ 329.400735] erofs: cannot find valid erofs superblock 07:22:27 executing program 2: syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x2, 0x80000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x10000009, 0x4, 0x0, 0x4001, 0x4, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000001400)='/dev/amidi#\x00', 0x0, 0x40000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000001580)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x8c002}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)={0x58, r2, 0x900, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x10000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7e0000000000}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) 07:22:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x301400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000140)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000000)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000080)="26f042ff007f7f8fa978db77e4660f3a0a848ae7000000e8e8436579092ac4e29903770864f3420f58af00b072150916240f38140aae640f14761b9de141") 07:22:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 329.599526] FAT-fs (loop3): Unrecognized mount option "‹NdwpÖq" or missing value 07:22:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="8cffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 330.012535] FAT-fs (loop3): Unrecognized mount option "‹NdwpÖq" or missing value 07:22:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0xefff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x100, 0x0, &(0x7f0000000200), 0x1000002, &(0x7f00000002c0)=ANY=[@ANYBLOB="8b4e647770d671"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:22:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ab0d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 330.832635] FAT-fs (loop3): Unrecognized mount option "‹NdwpÖq" or missing value [ 331.211929] EXT4-fs: 87 callbacks suppressed [ 331.211941] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 331.248191] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 331.266039] EXT4-fs (sda1): re-mounted. Opts: dax, 07:22:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0xefff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x100, 0x0, &(0x7f0000000200), 0x1000002, &(0x7f00000002c0)=ANY=[@ANYBLOB="8b4e647770d671"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:22:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:29 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000007c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syz_tun\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0x398) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000040)={0x1, 0x0, 0xac51, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000e80)=0xe8) recvmmsg(r1, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)=[{&(0x7f0000003880)=""/155, 0x9b}], 0x1, 0x0, 0x0, 0xc1}, 0x6}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000003ac0)=""/4, 0x4}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/4096, 0x1000}, {&(0x7f0000005b00)=""/119, 0x77}, {&(0x7f0000005b80)=""/23, 0x17}], 0x6, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}, {&(0x7f0000006e40)=""/103, 0x67}], 0x3, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}, {{0x0, 0x0, &(0x7f0000007000), 0x0, &(0x7f0000007040)=""/66, 0x42, 0x800}, 0x7}, {{&(0x7f00000070c0)=@sco, 0x80, &(0x7f0000008300)=[{&(0x7f0000007140)=""/136, 0x88}], 0x1, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}, 0x1}], 0x8, 0x0, 0x0) r3 = accept4$packet(0xffffffffffffffff, &(0x7f000000b800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b840)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f000000c200)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @remote, @loopback}, &(0x7f0000000240)=0x8ecb42072e9f4043) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x12, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000011440)={'syzkaller1\x00'}) ioctl$void(r3, 0x5450) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) getsockopt$inet6_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000400)=""/158, &(0x7f0000000180)=0x9e) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r6 = accept$alg(r5, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0x5e}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000009c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0xa, 0x78966531, 0xffffffffffff8360, 0x80000000, 0xcdd, 0x4, 0x81, 0x95, 0x8, 0x5, 0xfffffffffffffffb, 0x8001, 0x10001, 0x10, 0x4]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r7, 0x1f}, 0x8) [ 331.876988] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 331.915518] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 331.962843] EXT4-fs (sda1): re-mounted. Opts: dax, [ 331.981815] EXT4-fs (sda1): Cannot specify journal on remount [ 332.035609] EXT4-fs (sda1): Cannot specify journal on remount 07:22:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 332.135980] EXT4-fs (sda1): Cannot specify journal on remount 07:22:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff8c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000180", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:29 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000007c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syz_tun\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0x398) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000040)={0x1, 0x0, 0xac51, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000e80)=0xe8) recvmmsg(r1, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)=[{&(0x7f0000003880)=""/155, 0x9b}], 0x1, 0x0, 0x0, 0xc1}, 0x6}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000003ac0)=""/4, 0x4}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/4096, 0x1000}, {&(0x7f0000005b00)=""/119, 0x77}, {&(0x7f0000005b80)=""/23, 0x17}], 0x6, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}, {&(0x7f0000006e40)=""/103, 0x67}], 0x3, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}, {{0x0, 0x0, &(0x7f0000007000), 0x0, &(0x7f0000007040)=""/66, 0x42, 0x800}, 0x7}, {{&(0x7f00000070c0)=@sco, 0x80, &(0x7f0000008300)=[{&(0x7f0000007140)=""/136, 0x88}], 0x1, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}, 0x1}], 0x8, 0x0, 0x0) r3 = accept4$packet(0xffffffffffffffff, &(0x7f000000b800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b840)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f000000c200)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @remote, @loopback}, &(0x7f0000000240)=0x8ecb42072e9f4043) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x12, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000011440)={'syzkaller1\x00'}) ioctl$void(r3, 0x5450) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) getsockopt$inet6_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000400)=""/158, &(0x7f0000000180)=0x9e) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r6 = accept$alg(r5, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0x5e}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000009c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0xa, 0x78966531, 0xffffffffffff8360, 0x80000000, 0xcdd, 0x4, 0x81, 0x95, 0x8, 0x5, 0xfffffffffffffffb, 0x8001, 0x10001, 0x10, 0x4]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r7, 0x1f}, 0x8) [ 332.402869] FAT-fs (loop3): Unrecognized mount option "‹NdwpÖq" or missing value [ 332.422599] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:22:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0500000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) close(r1) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$evdev(r0, &(0x7f0000000180)=[{{0x0, 0x2710}, 0x4, 0x5}], 0x18) 07:22:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0700000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0020000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff8c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000280", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)=0x60, 0x0) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972757374e363757367725665783a4465", 0x0) 07:22:30 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000200)={0x3, 0xf0f024}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x2000, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000000)={0x8001001}) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x8d, 0xb, 0x2}) 07:22:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000100080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:30 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000006c0)={{{@in6, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000007c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'syz_tun\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000b00)=0x398) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000040)={0x1, 0x0, 0xac51, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000e80)=0xe8) recvmmsg(r1, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)=""/137, 0x89}], 0x1, 0x0, 0x0, 0x2}, 0xca}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5, 0x10001}, 0x5}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003940)=[{&(0x7f0000003880)=""/155, 0x9b}], 0x1, 0x0, 0x0, 0xc1}, 0x6}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000003ac0)=""/4, 0x4}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000004b00)=""/4096, 0x1000}, {&(0x7f0000005b00)=""/119, 0x77}, {&(0x7f0000005b80)=""/23, 0x17}], 0x6, &(0x7f0000005c40)=""/4096, 0x1000, 0xb5d}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}, {&(0x7f0000006dc0)=""/66, 0x42}, {&(0x7f0000006e40)=""/103, 0x67}], 0x3, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}, {{0x0, 0x0, &(0x7f0000007000), 0x0, &(0x7f0000007040)=""/66, 0x42, 0x800}, 0x7}, {{&(0x7f00000070c0)=@sco, 0x80, &(0x7f0000008300)=[{&(0x7f0000007140)=""/136, 0x88}], 0x1, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}, 0x1}], 0x8, 0x0, 0x0) r3 = accept4$packet(0xffffffffffffffff, &(0x7f000000b800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000b840)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f000000c200)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @remote, @loopback}, &(0x7f0000000240)=0x8ecb42072e9f4043) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x12, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000011440)={'syzkaller1\x00'}) ioctl$void(r3, 0x5450) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) getsockopt$inet6_tcp_buf(r2, 0x6, 0x0, &(0x7f0000000400)=""/158, &(0x7f0000000180)=0x9e) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r6 = accept$alg(r5, 0x0, 0x0) recvmmsg(r6, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0x5e}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000009c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0xa, 0x78966531, 0xffffffffffff8360, 0x80000000, 0xcdd, 0x4, 0x81, 0x95, 0x8, 0x5, 0xfffffffffffffffb, 0x8001, 0x10001, 0x10, 0x4]}, &(0x7f0000000280)=0x100) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000002c0)={r7, 0x1f}, 0x8) 07:22:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000100)=0x7fff, 0xff88) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000080)=0x7ffffffe, 0x4) r2 = dup3(r1, r0, 0x80000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb70}]}, 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x40000) 07:22:31 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x20000, 0x0) dup2(r0, r0) r1 = memfd_create(&(0x7f0000000700)='/dev/sequencer\x00', 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000780)='/dev/adsp#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0xffffffeffffffffc) dup(0xffffffffffffff9c) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x88001000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x308, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x20040004) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r3, 0x0, 0x1f, &(0x7f0000000240)='trustednodevvmnet0&,.cgroup[)+\x00'}, 0x30) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x200100, 0x0) mmap(&(0x7f0000d83000/0x2000)=nil, 0x2000, 0x0, 0x813, r5, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x100) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000280)={0x2b72, 0x8274}) userfaultfd(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) semget$private(0x0, 0x0, 0x214) getresuid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) syz_kvm_setup_cpu$x86(r10, r9, &(0x7f0000209000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x0, 0x0, &(0x7f0000000140)=[@cr0], 0x10000000000001a1) 07:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 333.762957] mmap: syz-executor3 (10254) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 07:22:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:31 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xf, 0x20, 0x6, 0x2}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x2}, &(0x7f0000000280)=0x8) socketpair$unix(0x1, 0x40000000000003, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000140)={0x1, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x42803) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r5, &(0x7f00000000c0)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, 0x0) 07:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, &(0x7f0000000140), 0x358) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000040)={0x31c9, {{0x2, 0x4e21, @broadcast}}}, 0x88) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000000)={0x0, 0x77, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) 07:22:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:32 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x20000, 0x0) dup2(r0, r0) r1 = memfd_create(&(0x7f0000000700)='/dev/sequencer\x00', 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000780)='/dev/adsp#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0xffffffeffffffffc) dup(0xffffffffffffff9c) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x88001000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x308, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x20040004) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r3, 0x0, 0x1f, &(0x7f0000000240)='trustednodevvmnet0&,.cgroup[)+\x00'}, 0x30) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x200100, 0x0) mmap(&(0x7f0000d83000/0x2000)=nil, 0x2000, 0x0, 0x813, r5, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x100) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000280)={0x2b72, 0x8274}) userfaultfd(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) semget$private(0x0, 0x0, 0x214) getresuid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) syz_kvm_setup_cpu$x86(r10, r9, &(0x7f0000209000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x0, 0x0, &(0x7f0000000140)=[@cr0], 0x10000000000001a1) 07:22:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x61, 0x204800) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x9}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000a00)={r2, 0x4}, &(0x7f0000000a40)=0x8) write$uinput_user_dev(r0, &(0x7f0000000540)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7d20]}, 0x45c) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) [ 335.270218] input: syz1 as /devices/virtual/input/input5 [ 335.350983] input: syz1 as /devices/virtual/input/input6 07:22:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ebffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0020000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00f83f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 336.268653] EXT4-fs: 80 callbacks suppressed [ 336.268674] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 336.281981] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 336.301356] EXT4-fs (sda1): re-mounted. Opts: dax, 07:22:33 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x20000, 0x0) dup2(r0, r0) r1 = memfd_create(&(0x7f0000000700)='/dev/sequencer\x00', 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000780)='/dev/adsp#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0xffffffeffffffffc) dup(0xffffffffffffff9c) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x88001000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x308, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x20040004) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r3, 0x0, 0x1f, &(0x7f0000000240)='trustednodevvmnet0&,.cgroup[)+\x00'}, 0x30) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x200100, 0x0) mmap(&(0x7f0000d83000/0x2000)=nil, 0x2000, 0x0, 0x813, r5, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x100) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000280)={0x2b72, 0x8274}) userfaultfd(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) semget$private(0x0, 0x0, 0x214) getresuid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) syz_kvm_setup_cpu$x86(r10, r9, &(0x7f0000209000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x0, 0x0, &(0x7f0000000140)=[@cr0], 0x10000000000001a1) 07:22:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000380", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 336.476936] EXT4-fs (sda1): Cannot specify journal on remount [ 336.591596] EXT4-fs (sda1): Cannot specify journal on remount [ 336.662719] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:22:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 336.721876] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 336.783635] EXT4-fs (sda1): re-mounted. Opts: dax, [ 336.804992] EXT4-fs (sda1): Cannot specify journal on remount [ 336.857285] EXT4-fs (sda1): Cannot specify journal on remount 07:22:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0600000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000080080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:35 executing program 3: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x20000, 0x0) dup2(r0, r0) r1 = memfd_create(&(0x7f0000000700)='/dev/sequencer\x00', 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000780)='/dev/adsp#\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x0, 0xffffffeffffffffc) dup(0xffffffffffffff9c) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x88001000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r4, 0x308, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x20040004) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r3, 0x0, 0x1f, &(0x7f0000000240)='trustednodevvmnet0&,.cgroup[)+\x00'}, 0x30) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x200100, 0x0) mmap(&(0x7f0000d83000/0x2000)=nil, 0x2000, 0x0, 0x813, r5, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x100) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000280)={0x2b72, 0x8274}) userfaultfd(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) semget$private(0x0, 0x0, 0x214) getresuid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) syz_kvm_setup_cpu$x86(r10, r9, &(0x7f0000209000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x0, 0x0, &(0x7f0000000140)=[@cr0], 0x10000000000001a1) 07:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="2d00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffffd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000200080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000002d80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007a80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:37 executing program 0: r0 = socket$inet(0x2, 0x4000000803, 0x4) socket$inet6(0xa, 0x1000000000002, 0x20) socketpair(0x1f, 0x80803, 0x6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000200)={0xfffffffffffffffe, "69117c1520226ab341563efcc1498c9fa46c4c3703dd16711408c5fecf585c34", 0x2}) syz_open_pts(r1, 0x125000) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0xb6, "3370c50f0500e67eccd391c87ac6c5b8d93becff06a0e83e53192a536a9a8c2e1cce5c619e3d96e76a439edf6000979851a4e6a15e9420fabdf9f65d56bd2f64722c38bfdf25ae14f8725d86fb2343ebb2287b353806736d1de6d1634a931ed4bee7787a5ffa1cc335582c98834f20272807489587b61d3a0c8f22370b3426efa32842f923bf9342f53358f75cb0ebcf02a179bd3c5cec11591388d0ad8e245255d05f09de250459f675b6a1b63dbc57efbd2826fbd4"}, &(0x7f0000000000)=0xda) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)) socket$bt_rfcomm(0x1f, 0x3, 0x3) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x10020002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f00000001c0)="fffc50a440589ff69e9c61583d637e33fb74a623", 0x14, 0x0, 0x0, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 07:22:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 340.017806] Invalid option length (170) for dns_resolver key 07:22:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x805, 0x0) r2 = socket(0x0, 0x5, 0xffffffff7fffffff) listen(r2, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000}, 0x1c) accept4$packet(r2, &(0x7f0000000100), &(0x7f0000000180)=0x9, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f00000008c0)=ANY=[]}, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8a05, 0x0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f00000001c0)={0x3, 0x2c4}) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50}, 0x50) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000280)={0x0, 0x7, 0x0, 0x4}, 0x14) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) close(0xffffffffffffffff) 07:22:37 executing program 0: r0 = socket$inet6(0xa, 0x8000000000000802, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x3, 0x0, @mcast2}, 0x1c, &(0x7f0000fc8000), 0x3ab}, 0x8000) r1 = socket$inet6(0xa, 0x1000000000006, 0x0) socket$inet6(0xa, 0x6, 0xfffffffffffff801) ioctl(r1, 0x8912, &(0x7f00000000c0)="153f6234488dd25a976070") close(r0) 07:22:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0040000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:37 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400002, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000040)) write(r2, &(0x7f0000000400)="1b00000042001f0fff07f4f9002304000afa04e611080041000201", 0x1b) 07:22:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7a00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x805, 0x0) r2 = socket(0x0, 0x5, 0xffffffff7fffffff) listen(r2, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000}, 0x1c) accept4$packet(r2, &(0x7f0000000100), &(0x7f0000000180)=0x9, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) sendmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f00000008c0)=ANY=[]}, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) r3 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8a05, 0x0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f00000001c0)={0x3, 0x2c4}) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50}, 0x50) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000280)={0x0, 0x7, 0x0, 0x4}, 0x14) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) close(0xffffffffffffffff) 07:22:38 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000a40)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000cc0)) sched_setscheduler(0x0, 0x0, &(0x7f0000000d40)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=@known='system.sockprotoname\x00', &(0x7f0000000080)='net/ip6_mr_cache\x00', 0x11, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl(r1, 0x6d, &(0x7f0000000d80)="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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f0000000800)=0xc) epoll_wait(r1, &(0x7f0000000500)=[{}, {}, {}, {}, {}], 0x5, 0xff) recvmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000240)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/181, 0xb5}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/73, 0x49}, {&(0x7f0000000040)=""/56, 0x38}], 0x4, &(0x7f0000000440)=""/66, 0x42, 0xff}, 0x2060) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xadb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(r0, &(0x7f0000000100)='personality\x00') preadv(r3, &(0x7f00000017c0), 0x1fe, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000540)=""/247) lsetxattr$security_capability(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000700)='security.capability\x00', &(0x7f0000000740)=@v3={0x3000000, [{0x752, 0x1}, {0x3, 0x8}], r2}, 0x18, 0x3) syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x6, 0xd2000) syz_open_dev$media(&(0x7f0000000680)='/dev/media#\x00', 0x2, 0x80040) prctl$getname(0x10, &(0x7f0000000140)=""/105) 07:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="002d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:38 executing program 3: r0 = gettid() r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x44a400, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$netlink(r2, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r3 = memfd_create(&(0x7f0000002480)="3a6e6f6465762373656c696e7578f66e6f64657600", 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000000080)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x3e8, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$KDSETLED(r3, 0x4b32, 0x2) 07:22:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000dab80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="f8f73f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:38 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000080)={0xffffffffffffaf3e, "5229f680a097adaa7745215579ae828e6322002fc7f9930a69e4ad34a0dfe39f", 0x2, 0x1}) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x13, 0x7, 0x15, 0xb, 0x1, 0x1, 0x6, 0x90, 0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x100, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f00000000c0)={0x1, @pix_mp}) r2 = getpid() stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() getresgid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) r7 = getgid() getgroups(0x4, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00]) r9 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) r11 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) getgroups(0x9, &(0x7f00000007c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xee00, 0xee01]) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='system.posix_acl_default\x00', &(0x7f0000000800)={{}, {0x1, 0x3}, [{0x2, 0x2, r3}, {0x2, 0x4, r4}], {0x4, 0x3}, [{0x8, 0x3, r5}, {0x8, 0x5, r6}, {0x8, 0x4, r7}, {0x8, 0x0, r8}, {0x8, 0x0, r9}, {0x8, 0x2, r10}, {0x8, 0x0, r11}, {0x8, 0x1, r12}, {0x8, 0x2, r13}], {0x10, 0x6}, {0x20, 0x1}}, 0x7c, 0x1) perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0x7, 0xfffffffffffffffe, 0x8, 0x0, 0x0, 0xdda, 0x1104, 0x2, 0xc7, 0x9cbd, 0x9, 0xfb, 0x3, 0x3, 0x40, 0xad66, 0x5, 0xffff, 0x0, 0x9452, 0x9, 0x93, 0x3f, 0x8, 0x3, 0x9, 0x50a, 0x100000001, 0x20, 0x5d, 0x2, 0x7b, 0xfff, 0x5327, 0x0, 0x0, 0x0, 0x7, 0x5, @perf_bp={&(0x7f0000000300), 0x4}, 0x20, 0x0, 0x6, 0x2, 0xf57, 0xffffffffffffb589, 0x7ff}, r2, 0x6, r0, 0x1) mknod(&(0x7f0000000280)='./file0\x00', 0x1000, 0x81) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)={0x8, 0xfffffffffffffffd, [], {0x4, @reserved}}) 07:22:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 341.314229] EXT4-fs: 70 callbacks suppressed [ 341.314240] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:22:38 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001800016061aa01cb54c2975aec73000000000000000000020000000000ff00ffffff9e"], 0x1c}}, 0x0) [ 341.379152] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 341.427031] EXT4-fs (sda1): re-mounted. Opts: dax, [ 341.433408] EXT4-fs (sda1): Cannot specify journal on remount 07:22:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 341.501887] EXT4-fs (sda1): Cannot specify journal on remount 07:22:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f00000002c0)=ANY=[]) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x42042, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f00000002c0)={0xe, 0x5, 0x7f, 0x3, 0x6, 0xdc}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f00000003c0)) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[], 0x97) sendfile(r1, r1, &(0x7f00000000c0)=0x6, 0x8080ffffff10) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x5, 0x82) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000005c0)=0x7fffffff) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x8000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf3, 0x5, 0x0, 0x0, 0x5, 0x4, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x404, 0x0, 0x0, 0x7, 0x0, 0x1000, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001480)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000000c0)=""/48, 0x30}], 0x2, &(0x7f00000013c0)=""/141, 0x8d}}], 0x1, 0x0, &(0x7f00000015c0)) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x5, 0x20}, &(0x7f0000000500)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000540)={0x7b24, 0x5, 0x8001, 0xffffffff, 0x7fff, 0x0, 0x0, 0x4, r5}, &(0x7f0000000580)=0x20) getsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000001c0)=""/31, &(0x7f0000000240)=0x1f) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000001600)={0x3, 0x0, 0x2080, {0x0, 0xf000, 0x1}, [], "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", "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"}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000700)=ANY=[@ANYBLOB="9109000000b8a51900000000000000006593e093a3ce30da507649267b359ef91597da2683ee2ed1c06b5c4979a2db0b9002801fb1deb49d8b014e2549b2805a3765e46174d80cde732ac5165ab1028b23c8fa0760a027fed020dd127968f3f6ddf9547e320fc09e9cf6b006c87ed8a5e9d75562b73c62cfc730055d80e284f50e00414b49bd57"], &(0x7f0000000640)=0x1) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000480)=""/119) 07:22:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 341.564668] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 341.590062] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 341.606910] EXT4-fs (sda1): re-mounted. Opts: dax, 07:22:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000380", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 341.612168] EXT4-fs (sda1): Cannot specify journal on remount 07:22:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/uinput\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = getpgrp(0xffffffffffffffff) r3 = syz_open_dev$vcsn(&(0x7f00000004c0)='/dev/vcs#\x00', 0xfff, 0x4000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000540)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r3, 0x0, 0x10, &(0x7f0000000500)="6b657972696e672a4065746830c42f00", r4}, 0x30) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000040)=0x17, 0x4) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000840)={0x0, 0x4}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000300)={{}, 'syz0\x00'}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101040, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r5, 0x808c563d, &(0x7f0000000140)) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001940)='/dev/hwrng\x00', 0x109004, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) ioctl$KVM_CHECK_EXTENSION(r6, 0xae03, 0x80000000) ioctl$sock_bt(r6, 0x541b, &(0x7f0000000900)="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") ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r5, 0x401870cc, &(0x7f0000000280)={0x5, 0x12000000000000, 0x17a1e000}) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f00000002c0)={0x0, 0x200, 0x7f30, 0x7}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f00000003c0)={r7, @in6={{0xa, 0x4e24, 0x8, @mcast2, 0x6}}, 0xfffffffffffffffc, 0x5, 0x0, 0x9, 0x4}, &(0x7f0000000480)=0x98) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r6, 0xc0045540, &(0x7f0000000880)=0x8) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000080)={{}, "7379ff0f000000000000000000000000000000000000000000000000000000000000001500"}) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r6, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20004}, 0xc, &(0x7f0000000780)={&(0x7f00000006c0)=ANY=[@ANYBLOB="b4000000", @ANYRES16=r8, @ANYBLOB="08002dbd7000fcdbdf250b0000000c00010008000999ca6898dafc05bf00080007004e240000080003000200000008000500ac1414aa2c00020008000600000000800800040003000000000007000100000008000b000a00000008000700090000000800060029fcffff08000500ff0f00000800040003000000340001000c00070001000000000000000c0006006e6f6e6500000000080004004e22000008000200ef0000000800080000000000"], 0xb4}, 0x1, 0x0, 0x0, 0x4000}, 0x884) write$input_event(r0, &(0x7f0000000800)={{}, 0x3, 0x300, 0x3f}, 0x18) 07:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 341.894773] FAT-fs (loop3): Unrecognized mount option "" or missing value [ 341.916275] input: syz0 as /devices/virtual/input/input7 [ 341.940032] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 341.955408] input: syz0 as /devices/virtual/input/input8 07:22:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0300000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 342.489662] FAT-fs (loop3): Unrecognized mount option "" or missing value 07:22:40 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x189000) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="694f09686172f187fb64084bcf110026f4dc437365c65ab41ca7f7743d756e43382c00f619387c837c1be4adeb0e003fbeff01e55690d43b8f066a7e8c"]) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0xf3, 0x0, 0x1, 0x1, 0x400, 0x3, 0xfffffffffffffeff, 0x8, 0x5, 0x0, 0x9, 0x4}) 07:22:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ab0d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r2}) setsockopt$inet6_int(r1, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x20000000000001e, 0x30c, 0x0, 0x5002, 0xe003, 0x33c, 0x7102, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r3}) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r3}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477752b2332869f8df76ac8a5cffba513d97cc2d108efcf86a162af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r2}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000740)=0x1f) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000540)={0x4, 0x5, 0x3, 0x5, 0x100, 0x81}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000600)=ANY=[@ANYBLOB="00000700b4937b8ff4ae795507e17f47c0"], &(0x7f00000005c0)=0x1) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r6, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) mq_open(&(0x7f0000000000)="2e1f05", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) 07:22:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 342.893320] FAT-fs (loop3): Unrecognized mount option "iO harñ‡ûdKÏ" or missing value 07:22:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 342.944714] capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) 07:22:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6800000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffffeb80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r2}) setsockopt$inet6_int(r1, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x20000000000001e, 0x30c, 0x0, 0x5002, 0xe003, 0x33c, 0x7102, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r3}) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r3}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477752b2332869f8df76ac8a5cffba513d97cc2d108efcf86a162af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r2}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000740)=0x1f) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000540)={0x4, 0x5, 0x3, 0x5, 0x100, 0x81}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000600)=ANY=[@ANYBLOB="00000700b4937b8ff4ae795507e17f47c0"], &(0x7f00000005c0)=0x1) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r6, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) mq_open(&(0x7f0000000000)="2e1f05", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) 07:22:40 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r2}) setsockopt$inet6_int(r1, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x20000000000001e, 0x30c, 0x0, 0x5002, 0xe003, 0x33c, 0x7102, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r3}) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r3}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477752b2332869f8df76ac8a5cffba513d97cc2d108efcf86a162af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r2}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000740)=0x1f) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000540)={0x4, 0x5, 0x3, 0x5, 0x100, 0x81}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000600)=ANY=[@ANYBLOB="00000700b4937b8ff4ae795507e17f47c0"], &(0x7f00000005c0)=0x1) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r6, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) mq_open(&(0x7f0000000000)="2e1f05", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) 07:22:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:40 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0xf, 0x6, 0x9, "79fdccca51e737d1a43b4037eb5bfc"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000300)) 07:22:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r0, 0xc0c0583b, &(0x7f0000000040)={0x528020000000000}) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000200)=0xc) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) accept$unix(r0, 0x0, &(0x7f0000000240)) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cd061785f720900643d3078303034303030303030b03030303030302c61707072616973658c61708172616973652c00"]) 07:22:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffff9780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0dab000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:41 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0xf, 0x6, 0x9, "79fdccca51e737d1a43b4037eb5bfc"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000300)) 07:22:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:41 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0xf, 0x6, 0x9, "79fdccca51e737d1a43b4037eb5bfc"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000300)) 07:22:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="1000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0020000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0400000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x10000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000000580)=[{&(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="01bd941ae05f286b9c58a1c4e79a1a247dbf340430dc455b37e689971ea7d1c3181608837995577f39f875dcbab860ab8f113248a0b1", 0x36}, {&(0x7f0000000200)="cbdcacd687ad1c1573b3875cfddf92699a42c162d8efe46f03b3be3497ccb3df3e492ce8ce64cadac17d95bc148d82c0663eed0741600b92fe2a1f226b5966f80956473a355ee6ed37b4111b6f7b973113ab2763672ca580f4ec06f96716ef03e58d26a279c892ecdd7f1db247313044bda375425a1b835b6186a2efaccdbc4f4010b96012aed6d0a63f7c3f2dc2d4e662f52976d366fc113e41a70a038eeafc513930f1c9b552392572009fd96f6ad3e18e5e90c1e7bc7d9aa902935e30acd7fdb9f995a75a1f47b2", 0xc9}, {&(0x7f00000005c0)="bb687c923cf6dc61aded39fa39f7b77f4770e99d7d22bb71b98ba21fe1c87fd442dc6b4f142a43be7ba08b96c10dcdb15af561ad46d77dace5c38328a8b7e363ba852b1ab2862748f722f45a8a6462af9cc4ea009f5f4918204bb0bdb7603117a4edc1c65ef6754f824c", 0x6a}, {&(0x7f0000000640)="3f9aebba2bffcc3f8d596dbe567db58d4fca2022772613fd8dd9d7f776a6d45d1e12296d1b70ebd61cf85cc0dd8b7498dad4b8669f9c195dd67826136e92d71dcef7e4c4ce82f035457110fa00b6ad78b69263e49e1032d23e9553f78b7d94c82798172edd527e651cdc31a6fb759287636c2e766f4370b776265e5588be78001deec85a67762872fbad24afa48654f926952070f6e15716b760cb5c14c249eabc325371121ded", 0xa7}], 0x4, &(0x7f0000000500), 0x0, 0x2}], 0x492492492492171, 0x48000) accept4(r2, 0x0, &(0x7f0000001040), 0x0) write$binfmt_aout(r0, &(0x7f0000000380)={{0x107, 0xffffffffffffffff, 0x100000001, 0x3e0, 0x11, 0x2, 0x1e6, 0xcea1}, "6cb586bb24ed2d63be0925c6f87bc7bb8d07be9f1a1fc61ee39e977b8ceb1edd97b0ab3fb9a7d2c66d672aa30a5bea0757b5715f3514ea9b333b891933b4dee0acc737df2ba9ec6a91d0968ae81214b5b73a9627d7d464014e2f154c01bda651f6d3d027350002ea2bf8e527", [[]]}, 0x18c) 07:22:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0018000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000280", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="8cffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:43 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:43 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x2, r1}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) r5 = getuid() mount$9p_unix(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x4, &(0x7f0000000440)={'trans=unix,', {[{@fscache='fscache'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@dfltgid={'dfltgid', 0x3d, r3}}], [{@fowner_gt={'fowner>', r4}}, {@uid_gt={'uid>', r5}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x7f, 0x63, 0x76, 0x31, 0x77, 0xd2e2a30a34423510, 0x67], 0x2d, [0x0, 0x61, 0x7f, 0x33], 0x2d, [0x66, 0x77, 0x77, 0x39], 0x2d, [0x31, 0x7d, 0x77, 0x64], 0x2d, [0x35, 0x7d, 0x77, 0x67, 0x33, 0x65, 0x33, 0x77]}}}, {@subj_user={'subj_user', 0x3d, "637075736574e5fc"}}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0xe}}, {@subj_type={'subj_type'}}]}}) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010307031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 07:22:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 346.374913] EXT4-fs: 86 callbacks suppressed [ 346.374925] EXT4-fs (sda1): Cannot specify journal on remount [ 346.497087] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. [ 346.535907] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 346.559502] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 07:22:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00007a0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:44 executing program 3: syz_emit_ethernet(0xfffffffffffffc84, &(0x7f0000000000)={@broadcast, @local, [{[], {0x8100, 0x7ff, 0xc697, 0x1}}], {@ipx={0x8137, {0xffff, 0x73, 0x1, 0x0, {@current, @current, 0xd486}, {@broadcast, @random="87f91db71b4c", 0x7}, "eabe9a5e74f07ea4f7f51fd20ab6d54d3d0bc37483cd7139bb4e6c0db0a70ddf7e00f435e66f77e66b53bfcaddf3bce15abfbe8e09560e1546f6fc72da9366aa04c6f16a3e9cabb910786bbc457617e830d8c7d4ee"}}}}, &(0x7f00000000c0)={0x1, 0x2, [0x331, 0x83c, 0x3d2, 0x8b]}) syz_emit_ethernet(0xe0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)={0x0, 0x1, [0x10000852, 0xdad, 0xba0, 0xb4d]}) [ 346.624755] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting 07:22:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 346.677595] EXT4-fs (sda1): re-mounted. Opts: dax, [ 346.682999] EXT4-fs (sda1): Cannot specify journal on remount [ 346.737685] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 346.764331] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 346.811086] EXT4-fs (sda1): re-mounted. Opts: dax, [ 346.822249] EXT4-fs (sda1): Cannot specify journal on remount 07:22:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0032000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:44 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xfff8000000000000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@filter={'filter\x00', 0xe, 0x4, 0x550, 0x2a0, 0x2a0, 0x390, 0x390, 0x0, 0x480, 0x480, 0x480, 0x480, 0x480, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0x258, 0x2a0, 0x0, {}, [@common=@inet=@sctp={0x148, 'sctp\x00', 0x0, {0x4e21, 0x4e23, 0x4e20, 0x4e21, [0x5, 0x97, 0xfffffffffffffc01, 0x40, 0x0, 0x8, 0xf82f, 0x900000, 0x201, 0xf4bc, 0x9, 0xfffffffffffffffd, 0x8001, 0x8, 0x7, 0x7, 0x6, 0xffff, 0x6ccf, 0x2, 0x2, 0x6, 0x100, 0x1, 0x9, 0x6, 0x7fff, 0xfffffffeffffffff, 0x2, 0xd, 0x3, 0x8, 0xfffffffffffffc00, 0x924, 0x80, 0x5, 0x1ff, 0x20, 0x100000001, 0x7, 0x0, 0x3dc, 0x7f, 0x100000001, 0x800, 0x6, 0x75, 0x3ff, 0x0, 0xfff, 0x4, 0xffffffffffffff7f, 0xe42, 0x9, 0x5c, 0x3, 0x0, 0x2, 0x5, 0xffffffffffffffff, 0x2, 0x8, 0x100000000, 0x3], 0x1, [{0xffffffffffffff80, 0x0, 0x1}, {0x8, 0xd80000000000, 0x4}, {0xffffffff, 0x6}, {0x5, 0x6, 0x80000000}], 0x1, 0x4, 0x6}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x3a3, 0x7, 0x1, [0x2, 0x39, 0x1, 0x3, 0x6, 0x3, 0x744, 0x3, 0x4, 0x9, 0xd5f, 0xe0f, 0x5, 0x20, 0x7]}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'veth0_to_bond\x00', 0x5}}}, {{@ipv6={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, @dev={0xfe, 0x80, [], 0x10}, [0xff000000, 0x0, 0xffffffff, 0xff000000], [0x0, 0xffffffff, 0xffffffff], 'bond_slave_0\x00', 'bridge0\x00', {0xff}, {0xff}, 0x0, 0xffff, 0x6, 0x51}, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffffffff}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5b0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0xc811, r2, 0x0) get_robust_list(0x0, &(0x7f0000002600)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f00000025c0)}, 0x0, &(0x7f0000000240)={&(0x7f0000002580)}}, &(0x7f0000000300)=0xfffffe9f) 07:22:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfc80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 346.959712] EXT4-fs (sda1): Cannot specify journal on remount 07:22:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000]}, 0x45c) r1 = dup(r0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) write$uinput_user_dev(r1, &(0x7f0000000d00)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x45c) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)=0x1) 07:22:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00ab0d0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 347.237972] input: syz1 as /devices/virtual/input/input9 [ 347.314009] input: syz1 as /devices/virtual/input/input10 07:22:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ffffffeb80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="ebffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0002000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000dc0)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e50f731acf1175885738c27d8a6ee3b945b1ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e545210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a8871ce0f3534576b635ea8a6e56f3d989a087717bd0e6ce8ecec24c3bd08b275567a2f4ac413da1343f2c91f8925a014a50d125ed9a87314530d98c010071e339e297d366fa02cc5643a2a270347f3f8a2e5efcdbaf477415ef18b127c11d2e159d03e2993966b3854fc2f411084ea7a7a132fd3c252021b00ab3cd6863edbe6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242da95c60be0a9fda82c455d7818346b94fbd21e5480432a3f33e7ff48c045b206beee871eba174556b60a1f4792b9b6d6d39225e22c554187498dc2eb2f27967cb85a148190ca78ce3a3da82d09b2b8a86f0cb5f3c989c18b25b450eafbb02a33c797a24b3afe3fb7e4780a05514b92218494b0bb61003e61ba3213c0116ca65663c35fa33f102c4aa8f141400764efe5f657495b7844cc763e631de0150a00bcec5b98bc4af88d862b070c2d9f8a55da4cc6870c1ff6239c0bf9189f43f4066ae791f824dcb9b98f871d194f00024c914a74ed7d8f038bdadd278156a18c6b5c2d8d7b06ab78d0c7bbfa8b1f23cdbb9273e60afd3e655962d0c4aee8cb1f67a7903b50c6cddda999de4b7cde76107a2d8c20ed07c166e59f28af0b33ea468edd20c708ce38"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x5002, 0x0, 0xe003, 0x33c, 0x7102, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477752b2332869f8df76ac8a5cffba513d97cc2d108efcf86a162af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r4, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000540)={0x4, 0x5, 0x3, 0x5, 0x100, 0x81}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\b\x00'], &(0x7f00000005c0)=0x1) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) mq_open(&(0x7f0000000000)="2e1f05", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400080, 0x0) getresgid(&(0x7f00000004c0), &(0x7f00000001c0), &(0x7f0000000280)) 07:22:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="3200000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:45 executing program 3: r0 = getpgrp(0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/l2cap\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600"}) geteuid() syz_open_procfs(0x0, &(0x7f0000314f8c)="6d6f756e74696e666f004388f750c83d14c4a3a9ac1488a477660ae763891738ac656bb3e891941f02f1265047502f6c2dd9f655ef7131eabf3110d638f0d2e6a49a2bc4a08d63e2da7af47e6c37972352875f125bcf3ea7f04b7b505b6a06beedb2a86e30a86bc0d37a6438b99a45ea22b1f4fb") readv(0xffffffffffffffff, &(0x7f000005a000), 0x0) readv(0xffffffffffffffff, &(0x7f00000014c0), 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)}}, 0x20) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x88642) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) 07:22:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000dab0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0dab000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x5002, 0x0, 0xe003, 0x33c, 0x7102, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477752b2332869f8df76ac8a5cffba513d97cc2d108efcf86a162af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r4, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000540)={0x4, 0x5, 0x3, 0x5, 0x100, 0x81}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\b\x00'], &(0x7f00000005c0)=0x1) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) mq_open(&(0x7f0000000000)="2e1f05", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400080, 0x0) getresgid(&(0x7f00000004c0), &(0x7f00000001c0), &(0x7f0000000280)) 07:22:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x5002, 0x0, 0xe003, 0x33c, 0x7102, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x1c0270, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477752b2332869f8df76ac8a5cffba513d97cc2d108efcf86a162af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r4, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000540)={0x4, 0x5, 0x3, 0x5, 0x100, 0x81}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\b\x00'], &(0x7f00000005c0)=0x1) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x509000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) mq_open(&(0x7f0000000000)="2e1f05", 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x2}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400080, 0x0) getresgid(&(0x7f00000004c0), &(0x7f00000001c0), &(0x7f0000000280)) 07:22:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140), 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0dab000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:45 executing program 0: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x15) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000340)={'ip6tnl0\x00', 0x1}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x9, 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300)=0x8, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000940)={0x15, 0x100, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in, @in={0x2, 0x0, @dev}}}, 0x118) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x5, 0x1}, &(0x7f00000002c0)=0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) unshare(0x40000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x4200) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x0, @dev, 'veth0\x00'}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000e80)=[&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000d80), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 07:22:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:45 executing program 3: r0 = socket(0xb, 0x2, 0x6e1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x6, [0xfffffffffffffffc, 0xdd3, 0x4, 0x7, 0x8001, 0xf7f2]}, &(0x7f0000000080)=0x10) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r2) 07:22:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 348.600164] IPVS: ftp: loaded support on port[0] = 21 07:22:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0200000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000740080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 349.250257] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 349.257009] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 349.304229] IPVS: ftp: loaded support on port[0] = 21 07:22:46 executing program 3: r0 = socket(0xb, 0x2, 0x6e1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x6, [0xfffffffffffffffc, 0xdd3, 0x4, 0x7, 0x8001, 0xf7f2]}, &(0x7f0000000080)=0x10) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r2) 07:22:46 executing program 0: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x15) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000340)={'ip6tnl0\x00', 0x1}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x9, 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000300)=0x8, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000940)={0x15, 0x100, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in, @in={0x2, 0x0, @dev}}}, 0x118) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x5, 0x1}, &(0x7f00000002c0)=0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) unshare(0x40000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x4200) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000140)={0x18, 0x0, {0x0, @dev, 'veth0\x00'}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000e80)=[&(0x7f0000000e40)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000d80), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 07:22:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 349.647302] IPVS: ftp: loaded support on port[0] = 21 [ 349.763729] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:22:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="97ffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00004c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003ff7f880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000070080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00003f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:48 executing program 3: r0 = socket(0xb, 0x2, 0x6e1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x6, [0xfffffffffffffffc, 0xdd3, 0x4, 0x7, 0x8001, 0xf7f2]}, &(0x7f0000000080)=0x10) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r2) 07:22:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00001f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0002000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffff680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 351.392329] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:22:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000030080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 351.477419] EXT4-fs: 75 callbacks suppressed [ 351.477431] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:22:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 351.536021] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 351.723279] EXT4-fs (sda1): re-mounted. Opts: dax, [ 351.759041] EXT4-fs (sda1): Cannot specify journal on remount [ 351.839780] EXT4-fs (sda1): Cannot specify journal on remount [ 351.907006] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:22:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 351.960071] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 351.976685] EXT4-fs (sda1): re-mounted. Opts: dax, [ 352.065982] EXT4-fs (sda1): Cannot specify journal on remount [ 352.182168] EXT4-fs (sda1): Cannot specify journal on remount 07:22:49 executing program 3: r0 = socket(0xb, 0x2, 0x6e1) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x6, [0xfffffffffffffffc, 0xdd3, 0x4, 0x7, 0x8001, 0xf7f2]}, &(0x7f0000000080)=0x10) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r2) 07:22:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00002d0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00002d0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffffd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 352.836568] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:22:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000050080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000dab80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00U', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000740080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000011", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:52 executing program 0: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000bc80128000000000000000000000000000000000000070000000000000000000000000000000000000000009848101f790625d9cf3957362c970bb20ab9a704b0a5c71fff31c3c8fe614af1d06c6271432ed47d003ec83f36ff5bb86595e1a813b05f03ce63287d6c7db1a9b0"]) r0 = getpid() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x248380, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x81}, &(0x7f0000000440)=0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) sched_setaffinity(r0, 0x1a047712eeea203e, &(0x7f0000000640)=0x1) socket$xdp(0x2c, 0x3, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000580)) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x3, @empty, 'ip6gretap0\x00'}}, 0x1e) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000005c0)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @remote}, {0x2, 0x4e22, @multicast1}, 0x200, 0x7, 0x3, 0x0, 0x708f, &(0x7f00000000c0)='bridge_slave_1\x00', 0x2, 0x7, 0xceb}) close(r3) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@dev, 0x0}, &(0x7f0000000540)=0x14) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x2007fff) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000000)=r0) write$P9_RXATTRCREATE(r7, &(0x7f0000000140)={0x7}, 0x7) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000480)=r4) write$P9_RSETATTR(r7, &(0x7f0000000040)={0x7}, 0x7) sendfile(r3, r7, &(0x7f0000d83ff8)=0xf2e, 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) 07:22:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00(', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000060080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000dab0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 355.244182] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 355.256273] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:22:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000200080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000480080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 355.936498] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:22:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\'', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00003f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00:', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 357.210220] EXT4-fs: 75 callbacks suppressed [ 357.210231] EXT4-fs (sda1): Cannot specify journal on remount [ 357.284535] EXT4-fs (sda1): Cannot specify journal on remount [ 357.324823] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 357.353882] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting 07:22:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00ab0d0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 357.424427] EXT4-fs (sda1): re-mounted. Opts: dax, [ 357.455081] EXT4-fs (sda1): Cannot specify journal on remount 07:22:54 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x200, 0x52000) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x1) 07:22:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240000000007070") r1 = socket$inet6(0xa, 0x6, 0x3b) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) sendto$inet6(r0, &(0x7f0000000040)="4c13a1314f11d55d2492996a515d4de9ba11d362913089442eed9627258fa302d3eacba82625206b503140dd9c19daa203f1527c076c32a6bc0a652795a928510d8c77e9bacaa43feda10b777d81e03224c98b18f5bbde10e5818653eb522ca6e38429d8ee9a97ccf7e0c3e1897ba907f8dc98cb340e21a5bbb712d82a69a9871c035e", 0x83, 0x20000000, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @empty, 0x1}, 0x1c) [ 357.557917] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:22:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 357.599009] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 357.648252] EXT4-fs (sda1): re-mounted. Opts: dax, 07:22:54 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 357.672217] EXT4-fs (sda1): Cannot specify journal on remount 07:22:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000010", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:55 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x238, 0x9, 0x7}) getdents64(r0, &(0x7f0000000080)=""/164, 0xa4) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000280)={0x3, 0x8, 0xfffffffffffffffd, 0xbaec, 0x1, 0x7}) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000002c0)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x1, r1, 0x30, 0x1, @in6={0xa, 0x4e23, 0x800, @mcast1, 0x2}}}, 0xa0) r2 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x401, 0x10080) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000440)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000480)={r3}) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f00000004c0)=0x2, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000580)={'bridge0\x00', &(0x7f0000000500)=@ethtool_coalesce={0xf, 0x7, 0x1, 0x7, 0x8, 0x94, 0x9, 0x80000000, 0x8, 0x3f, 0x1, 0x8, 0x9, 0x5, 0x46, 0x81, 0x6b0bf31e, 0xdb05, 0x2, 0x800, 0xd54, 0x7fff, 0x9}}) r5 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x5000) shmdt(r5) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000600)={0x0, 0x7e, "a060b5995cf583c2535836218c32026c3a7a8996d3a18e4ddb8c740d71893faa5c5344aaa34759b191dd34e524d3d7b298efe8c5465568c159350697cf79ed7520d0d23f8f645ca1913953fd491eacb354c40a6f527edd021b202eca4cc32736962bcb2e3e76bdc098db03278d80e0d391c5198de5cff8f82f2aa05ec1d7"}, &(0x7f00000006c0)=0x86) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000700)={r6, 0x20, 0x8, 0x3, 0x0, 0xba}, 0x14) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000740)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000007c0)=0x6) r7 = socket$inet6(0xa, 0x4, 0xfffffffffffffffd) fcntl$setflags(r7, 0x2, 0x0) write$P9_RCREATE(r0, &(0x7f0000000800)={0x18, 0x73, 0x1, {{0x2, 0x0, 0x3}, 0x7}}, 0x18) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000840), &(0x7f0000000880)=0x4) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000008c0)=@assoc_value={r6, 0x8}, 0x8) sendfile(r7, r4, &(0x7f0000000900), 0x1800000000000000) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vga_arbiter\x00', 0x80000, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000980)={'filter\x00'}, &(0x7f0000000a00)=0x44) ioctl$KVM_XEN_HVM_CONFIG(r8, 0x4038ae7a, &(0x7f0000000b40)={0x2, 0x585, &(0x7f0000000a40)="1de02ad9c0e95c35a1523a76d9492c1b103843e8e935cab0a4fd143a7b800c6a11934eeca57c801e2fe159d2c026a8a0618fcee72f6c1b326d4070bbbfc91d75f87d742f68602925c63a8a59d93f7bfb0220a68ec79a0ec045992492c6905b8b211aeb2755ba85f3c4f8d7a388db446c2da9ca63144fb6da", &(0x7f0000000ac0)="5147786d09bd3d72d143c2ebe7b2ce5d0edc3cd46f03d4063f1beb94f504905cf43250c50ed9af4980c78fa52e40599bda62d101a9022602e243035e92dac96cbce11a7466479f5d0f5795e6473d3a2e0247a73731ca2b5e8e12e9f516", 0x78, 0x5d}) 07:22:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00001f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:55 executing program 3: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @multicast2}, &(0x7f0000000080)=0xc) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000000c0)={@loopback, r2}, 0x14) 07:22:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000e48000)='/dev/sg#\x00', 0x0, 0x802) ioctl(r0, 0x4800000002284, &(0x7f00007bb000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) memfd_create(&(0x7f0000000180)='/dev/rtc0\x00', 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in6={0xa, 0x4e22, 0x3f, @mcast2, 0x3}}}, 0x90) 07:22:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00p', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:55 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000140)=0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0xfffffffffffffffc) dup3(r1, r2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x2000c0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000000)={0x7fff, 0x494e4f4b, 0x4, 0x86, 0x1, @stepwise={{0x8, 0x81}, {0x7fffffff, 0x1}, {0x602}}}) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) 07:22:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:56 executing program 0: r0 = socket(0x8, 0x800, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="280000001d00050000000000000000000200ef20", @ANYRES32=0x0, @ANYBLOB="00000b150c00c9ac84fecdd7c8b47833c16dc540ef18dbc23dfc161ad764f0e90f6bb3a80ed612c7bf173bf23319d1ec65ff00a797f85aabce9d540add75d1cf0361ec39c96e41b336832035adde44e3a949f5f5c84c0be8cc8c3b98f71c5cfc4d47ea6e0a329be2c78857111ae493b0ff5a9aa3228a35ca0b048a"], 0x380}}, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockname$packet(r0, &(0x7f0000008680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000086c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008700)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000008800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000008880)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000008980)=0xe8) clock_gettime(0x0, &(0x7f0000009880)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000009780)=[{{&(0x7f0000008a40)=@ipx, 0x80, &(0x7f0000008e80)=[{&(0x7f0000008ac0)=""/92, 0x5c}, {&(0x7f0000008b40)=""/150, 0x96}, {&(0x7f0000008c00)=""/178, 0xb2}, {&(0x7f0000008cc0)=""/32, 0x20}, {&(0x7f0000008d00)=""/147, 0x93}, {&(0x7f0000008dc0)=""/189, 0xbd}], 0x6, 0x0, 0x0, 0x1c000000000}, 0x1}, {{&(0x7f0000008f00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000090c0)=[{&(0x7f0000008f80)=""/27, 0x1b}, {&(0x7f0000008fc0)=""/26, 0x1a}, {&(0x7f0000009000)=""/37, 0x25}, {&(0x7f0000009040)=""/107, 0x6b}], 0x4, 0x0, 0x0, 0x7}, 0x4}, {{&(0x7f0000009100)=@alg, 0x80, &(0x7f0000009580)=[{&(0x7f0000009180)=""/175, 0xaf}, {&(0x7f0000009240)=""/115, 0x73}, {&(0x7f00000092c0)=""/24, 0x18}, {&(0x7f0000009300)=""/186, 0xba}, {&(0x7f00000093c0)=""/26, 0x1a}, {&(0x7f0000009400)=""/88, 0x58}, {&(0x7f0000009480)=""/203, 0xcb}], 0x7, &(0x7f0000009600)=""/132, 0x84, 0x4}, 0x800000}, {{0x0, 0x0, &(0x7f0000009740)=[{&(0x7f00000096c0)=""/77, 0x4d}], 0x1, 0x0, 0x0, 0x2}, 0x8}], 0x4, 0x0, &(0x7f00000098c0)={r5, r6+10000000}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000009940)={@local, 0x0}, &(0x7f0000009980)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000099c0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000009a00)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000009b00)=0xe8) getpeername(r0, &(0x7f000000d080)=@ll={0x11, 0x0, 0x0}, &(0x7f000000d100)=0x80) accept4$packet(r0, &(0x7f000000d140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000d180)=0x14, 0x80000) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000d200)=0x14, 0x807fc) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f000000d240)={@remote, 0x0}, &(0x7f000000d280)=0x14) getsockname$packet(r0, &(0x7f000000d380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000d3c0)=0x14) recvmsg(r0, &(0x7f000000e8c0)={&(0x7f000000d400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000e740)=[{&(0x7f000000d480)=""/132, 0x84}, {&(0x7f000000d540)=""/34, 0x22}, {&(0x7f000000d580)=""/35, 0x23}, {&(0x7f000000d5c0)=""/96, 0x60}, {&(0x7f000000d640)=""/45, 0x2d}, {&(0x7f000000d680)=""/4096, 0x1000}, {&(0x7f000000e680)=""/144, 0x90}], 0x7, &(0x7f000000e7c0)=""/252, 0xfc, 0x5}, 0x2000) accept$packet(r0, &(0x7f000000e900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000e940)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f000000e980)={{{@in6=@ipv4={[], [], @multicast2}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f000000ea80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000f580)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000f5c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f000000f6c0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f000000f7c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000010bc0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000010cc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000010dc0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000010ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000012840)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000012940)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000012ac0)={0x0, @dev}, &(0x7f0000012b00)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000012c00)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000012d00)=0xe8) getsockname$packet(r0, &(0x7f0000012d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000012d80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000012dc0)={'team0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000017100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000017140)=0x14) getpeername$packet(r0, &(0x7f0000017180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000171c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000017200)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000017300)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000017340)={0x0, @empty, @multicast1}, &(0x7f0000017380)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000173c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f00000174c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000017500)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000017600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000017640)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000017740)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000017780)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000017880)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000017d00)={0x0, @rand_addr, @multicast2}, &(0x7f0000017d40)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000187c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000018780)={&(0x7f0000017d80)={0x9fc, r1, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x130, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r8}, {0x228, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb9a8}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2fc}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}]}}, {{0x8, 0x1, r14}, {0x1e0, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x26ff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3287cd8f}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0x16c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9d}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r24}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r25}}}]}}, {{0x8, 0x1, r26}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r27}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r28}}}]}}, {{0x8, 0x1, r29}, {0x224, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}, {0x8, 0x6, r30}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r32}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r33}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r34}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}]}}, {{0x8, 0x1, r36}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r37}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}]}, 0x9fc}, 0x1, 0x0, 0x0, 0x20004091}, 0x40000) 07:22:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:56 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000500, 0x300000000000000, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000240)={'filter\x00', 0x0, 0x3, 0x87, [], 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000140)=""/135}, &(0x7f0000000080)=0x78) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000340)=""/169) time(&(0x7f0000000400)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) 07:22:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000180080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00003f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000050080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000030080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000000), 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20, 0x8aff, 0x0, 0x0, {0x7}, [@nested={0x8, 0x1, [@typed={0x4, 0x0, @binary}]}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback, 0x3}, {0xa, 0x4e22, 0x2, @remote, 0x2}, 0x608, [0x9, 0x0, 0x10001, 0x8, 0x2, 0x0, 0x2]}, 0x5c) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setlease(r1, 0x400, 0x2) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x550, 0x2e0, 0x2e0, 0x0, 0x0, 0x1d0, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x6, &(0x7f0000000240), {[{{@ip={@local, @broadcast, 0x0, 0xffffffff, 'yam0\x00', 'ip6gretap0\x00', {0xff}, {0xff}, 0x2f, 0x3, 0x51}, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0x65}}}, {{@ip={@broadcast, @remote, 0xffffffff, 0xffffffff, 'veth1\x00', 'ipddp0\x00', {}, {}, 0x5f, 0x1, 0x40}, 0x0, 0xe0, 0x110, 0x0, {}, [@common=@unspec=@limit={0x48, 'limit\x00', 0x0, {0x4, 0x13, 0x7, 0x4, 0x1, 0x1, 0x2}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x1, 0x1, @loopback, 0x4e24}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xe}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2b}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0xdd30, 0xfff}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x10, 0x4, 0x3}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x3f, 0xffff, 0x1}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000070073010000e9000000ffffffff79400000080000d8adbcfd118db8152ecb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e49fd1a4fe501b362b0ae7854cdaad59c34e4076482195afe14688f7c8d9e58461982c96e271dd2e6c52018d1cff96daad95bdd228ac0eda42f324a1e1590447ec9a7b58757a01b264117ef55a1d60bea94457b6fbb2aa86a05f0cf0fcaddc3475ef5514e0a0fec44f78634af44b56ba45670df23536bf8f0e4b3"], 0xb9) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x34d1, 0xfffffffffffffffc, 0x20000000000001ef}, 0x10}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2005000}, 0xc, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) fsetxattr$security_capability(r4, &(0x7f00000000c0)='security.capability\x00', &(0x7f00000004c0)=@v2={0x2000000, [{0x4, 0x58f3}, {0x1f, 0x4}]}, 0x14, 0x2) 07:22:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00006c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000000), 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20, 0x8aff, 0x0, 0x0, {0x7}, [@nested={0x8, 0x1, [@typed={0x4, 0x0, @binary}]}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback, 0x3}, {0xa, 0x4e22, 0x2, @remote, 0x2}, 0x608, [0x9, 0x0, 0x10001, 0x8, 0x2, 0x0, 0x2]}, 0x5c) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setlease(r1, 0x400, 0x2) listen(r2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000005c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x550, 0x2e0, 0x2e0, 0x0, 0x0, 0x1d0, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x6, &(0x7f0000000240), {[{{@ip={@local, @broadcast, 0x0, 0xffffffff, 'yam0\x00', 'ip6gretap0\x00', {0xff}, {0xff}, 0x2f, 0x3, 0x51}, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0x65}}}, {{@ip={@broadcast, @remote, 0xffffffff, 0xffffffff, 'veth1\x00', 'ipddp0\x00', {}, {}, 0x5f, 0x1, 0x40}, 0x0, 0xe0, 0x110, 0x0, {}, [@common=@unspec=@limit={0x48, 'limit\x00', 0x0, {0x4, 0x13, 0x7, 0x4, 0x1, 0x1, 0x2}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x1, 0x1, @loopback, 0x4e24}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xe}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2b}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0xdd30, 0xfff}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x10, 0x4, 0x3}}}, {{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x3f, 0xffff, 0x1}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5b0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000070073010000e9000000ffffffff79400000080000d8adbcfd118db8152ecb47ba143ecdbf35c6e47c791f4ade381c3fdd0dd1c2847e38de1d011e772e49fd1a4fe501b362b0ae7854cdaad59c34e4076482195afe14688f7c8d9e58461982c96e271dd2e6c52018d1cff96daad95bdd228ac0eda42f324a1e1590447ec9a7b58757a01b264117ef55a1d60bea94457b6fbb2aa86a05f0cf0fcaddc3475ef5514e0a0fec44f78634af44b56ba45670df23536bf8f0e4b3"], 0xb9) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) r4 = accept4(r2, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$key(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, 0x34d1, 0xfffffffffffffffc, 0x20000000000001ef}, 0x10}}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2005000}, 0xc, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) fsetxattr$security_capability(r4, &(0x7f00000000c0)='security.capability\x00', &(0x7f00000004c0)=@v2={0x2000000, [{0x4, 0x58f3}, {0x1f, 0x4}]}, 0x14, 0x2) 07:22:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000040)) read(r0, &(0x7f0000a16000)=""/71, 0x47) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xff, 0x200) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000001c0)=0xffff, 0x391) getsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000000140), &(0x7f0000000180)=0x4) 07:22:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000017", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0004000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:58 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x402000, 0x0) ioctl$TCSETSF(r0, 0xc0046d00, &(0x7f0000000000)) 07:22:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0004000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:58 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xffffffffff, 0x3) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000600), &(0x7f0000000640)=0x4) 07:22:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00Y', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:22:58 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0x1000024b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$sock_int(r4, 0x1, 0x28, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r4, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000027, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000d6, 0x0) 07:22:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000480080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:59 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0xc}, 0x1c) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000040)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x22, &(0x7f0000000080), 0x4) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x10, r2, 0x0) 07:22:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00006c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:59 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000001c0)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x5, 0x3) r0 = socket$packet(0x11, 0x2, 0x300) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x8bab) madvise(&(0x7f000084c000/0x2000)=nil, 0x2000, 0x9) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 07:22:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:22:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000060080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:22:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\\', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 362.323477] EXT4-fs: 66 callbacks suppressed [ 362.323488] EXT4-fs (sda1): Cannot specify journal on remount 07:22:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 362.470093] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 362.495622] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting 07:22:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 362.529834] EXT4-fs (sda1): re-mounted. Opts: dax, [ 362.537168] EXT4-fs (sda1): Cannot specify journal on remount [ 362.619615] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 362.627571] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 362.724381] EXT4-fs (sda1): re-mounted. Opts: dax, 07:23:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 362.744992] EXT4-fs (sda1): Cannot specify journal on remount 07:23:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00O', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 362.790167] EXT4-fs (sda1): Cannot specify journal on remount 07:23:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000180080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="002d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="0bc9004500001d63273f6215000000ac14ffbbe0000001000043050008907823425b27176040355d62f32ea706ed0941167262f423d4b9b052d6d312eeac58e361b22c2b6fa2e0c0dbf8dcd8b86415b7f5949b0d4d6082e7ad7387f8b10e29273c1de941e6775dbb60"], 0x0) 07:23:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00@', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00006c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000680080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000013", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1c}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x1b0001}, [@ldst={0x7, 0xbe03, 0x5, 0x0, 0xa}]}, &(0x7f0000000000)='syzkaller\x00', 0x400005, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x9c27, 0x5, 0x2, 0x898, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @rand_addr=0x7}}}, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) 07:23:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000200080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="002d000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00V', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:02 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0xfffffffffffffffd, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972697374e363757367725669643a4465", 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 07:23:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) sendmsg$netlink(r2, &(0x7f0000000300)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f00000002c0)=[{&(0x7f00000003c0)=ANY=[@ANYBLOB="10020000000021461e76000000000019"], 0x200002d0}], 0x1}, 0x0) close(r2) close(r1) 07:23:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="a17a645faa9b66d8d01867d0295b580a15983dec37f8060917d20860804a19d6a53669118a7fc5afd755dfa6e80e408a46cabca13b6457e7fa3bd62b76f87def4a7f5f52e10a8e3ca10c79c02afe1ee614bc9e560cf98da8b7891b809bec2c70"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) stat(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)) stat(&(0x7f0000000640)='./file0/file0\x00', &(0x7f0000000700)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffe}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0x127a) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) read$FUSE(r0, &(0x7f00000050c0), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85e7}}}, 0x90) close(r0) 07:23:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c2d", 0x7}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00004c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000013000000bfa300000000000007030000e8fdffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000045040400010000000404000001000000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={r0, 0x0, 0xe, 0x9f, &(0x7f0000000280)="43037f632e7592319135dad4e437", &(0x7f0000000380)=""/159, 0x100}, 0x28) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000100)={0x1, "29a8d01e6cba90b5a6b847db96068d0b51edd11a4a52e0ac7b3c2958117bb3a2", 0x2, 0x1}) 07:23:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0010000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:02 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x101000) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0x1, 0x6, 0x0, 0xfffffffffffffffe, 0xafa9, 0x80}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="0200000a0000000019000000dc0100002c000000010000000000000000000000000a00000020000040000000000000003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)) [ 365.661353] EXT4-fs (loop3): bad geometry: first data block 1 is beyond end of filesystem (0) [ 365.786667] EXT4-fs (loop3): bad geometry: first data block 1 is beyond end of filesystem (0) 07:23:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000050080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000380", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000300)="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", 0x102, 0x400}], 0x0, &(0x7f0000000000)=ANY=[]) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) bind$xdp(r0, &(0x7f00000001c0)={0x2c, 0x2, r1, 0x18, r2}, 0x10) 07:23:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00"', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0018000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 366.368218] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 366.425587] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 366.441696] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (96661801) 07:23:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000030080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 366.795121] EXT4-fs (loop3): Unrecognized mount option "/dev/input/mice" or missing value 07:23:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00+', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x4, 0x8001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept(r1, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000140)=0x80) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) kexec_load(0x101, 0x1, &(0x7f0000000540)=[{&(0x7f00000001c0), 0x0, 0x0, 0x1000000}], 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f0000000340)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)=0x6) r3 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x3, 0x0, 0x5, 0x3, 0x0, 0x8, 0x0, 0xf, 0x2000000000000000, 0x2, 0x3, 0x3585, 0xcde9, 0x3, 0x81, 0xffffffff7fffffff, 0x0, 0x0, 0x8, 0x20, 0x1, 0x86a, 0x0, 0x7, 0xfffffffffffffeff, 0xffffffffc76eb886, 0x5, 0x2, 0x5f, 0x2, 0x0, 0x8, 0x1, 0x5be, 0x3, 0x0, 0x0, 0xef, 0x4, @perf_config_ext={0x5}, 0x802, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x7ff, 0x4, 0x2, 0x0, 0x0}, &(0x7f0000000240)=0x10) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000400)={0x1, 0x8}, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000004c0)={r4, 0x3f}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000180)={r4, 0x4, 0x7fffffff, 0x7, 0x102, 0x7d}, &(0x7f0000000580)=0x14) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f00000002c0)={0x0, 0x81}) readlink(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=""/30, 0x1e) 07:23:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000680080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000020080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000003", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00007a0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000002300)='user\x00', &(0x7f0000002340)={'syz'}, &(0x7f0000002380)="a4", 0x1, r0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) keyctl$instantiate(0xc, r1, &(0x7f00000000c0)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', 'user\x00', 0x20, 0x9}, 0x2d, r0) keyctl$clear(0x7, r0) [ 367.533218] EXT4-fs: 69 callbacks suppressed [ 367.533231] EXT4-fs (sda1): Cannot specify journal on remount [ 367.661039] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 367.669174] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 367.747585] EXT4-fs (sda1): re-mounted. Opts: dax, [ 367.783732] EXT4-fs (sda1): Cannot specify journal on remount 07:23:05 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback, 0x3}, {0xa, 0x0, 0x0, @remote, 0x2}, 0x0, [0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x80]}, 0x5c) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000040)={0x0, 0x101, 0x1, 0x883, 0xa, 0xcf}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) listen(0xffffffffffffffff, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) tee(r2, r2, 0x0, 0x8) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x13}}, 0x1c) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020000fcef010000000000e8ffffff00bdd50d3be067b7016f67ef50d0f642de83947e05d96da4e93e0be058b80cdb492bc83c8ea8525c11eabd181d7e31538e5cbd25a8e2528188107b45e323ec221e21f29fc50f74291ee839009aebceadc65cce511fb6e92e74417b35edd42cea363c6f4068be4e8832a2c861ae40c1ddb6eaf694fc8f8cd615a6326968b6339c34cc39693dd443a1129b0c7a144508ae7073e9258fbd0fc05d7128919f12d822ae50f060ada3c7"], 0x10}}, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000340)) 07:23:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 367.831550] EXT4-fs (sda1): Cannot specify journal on remount 07:23:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00-', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 367.956801] EXT4-fs (sda1): Cannot specify journal on remount 07:23:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000200080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:05 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback, 0x3}, {0xa, 0x0, 0x0, @remote, 0x2}, 0x0, [0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x80]}, 0x5c) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000040)={0x0, 0x101, 0x1, 0x883, 0xa, 0xcf}) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) listen(0xffffffffffffffff, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000380)=0x1e) tee(r2, r2, 0x0, 0x8) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x13}}, 0x1c) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020000fcef010000000000e8ffffff00bdd50d3be067b7016f67ef50d0f642de83947e05d96da4e93e0be058b80cdb492bc83c8ea8525c11eabd181d7e31538e5cbd25a8e2528188107b45e323ec221e21f29fc50f74291ee839009aebceadc65cce511fb6e92e74417b35edd42cea363c6f4068be4e8832a2c861ae40c1ddb6eaf694fc8f8cd615a6326968b6339c34cc39693dd443a1129b0c7a144508ae7073e9258fbd0fc05d7128919f12d822ae50f060ada3c7"], 0x10}}, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000340)) [ 368.106259] EXT4-fs (sda1): Cannot specify journal on remount [ 368.232577] EXT4-fs (sda1): Cannot specify journal on remount 07:23:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 368.307552] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk 07:23:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00s', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000070080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:05 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000280)) r0 = accept4(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x80, 0x80800) sendmsg$kcm(r0, &(0x7f0000002680)={&(0x7f00000001c0)=@ipx={0x4, 0x4, 0x0, "414fa1152d1a", 0xfffffffffffffff7}, 0x80, &(0x7f0000002500)=[{&(0x7f0000000240)="0ce56ed47335fe977f5f4a865c6295f9f2d5", 0x12}, {&(0x7f00000002c0)="525a242d97e3ca96a569c49d506c93463f1794763dd642da113d8a5929dce535bb88b9eca020e8405150335eba58b1f5cf86174453805352b3cf4ce98af53e822cd4569e6764d29280836ea578009a0255629d90be2e477ce6bfbbdef5c245d2edcf70b961474def16c6755ae70f810cf37a593e0c8446f346de21937c41829bb1cf0f13e38d453fa0f6ae0d5772aa1ce13d6cfe871b868b93a5e8e2633c181b3733a84950ce7e3530aca79052", 0xad}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000001380)="fc1c7e9bc6ddeff35f7c4392061ab04c55e095063eb8fea8c89e500ee66de81a4f899c1f63c968f8fbaf25910d338ba2b3a959b5a9c651fcd7964e37a32ea6d243cab64ffd29d133489c5db7669e35ab9dcd495cb59828e945830266fac862d97d75412cf142436b60f856db569704896104e5a99636ba17a0d92d5f578a1d0e78bddb0ebf25c6276336059a53b2f4268ca94c5f461da152b8c543bc68e7d621933823df0e45ec335a04cc7bcdf310bb1fcf99d3d44465ee78cf3f943207d0f5153cc442ed2e1296b72462a6c744b2", 0xcf}, {&(0x7f0000001480)="e2e12210eae157cb285a01db60d0d2a27312e659f85adabef9cbd578481a71399a04fd40fa5fbe9067ec018ad1bc94cd80da5bbc95ad0fe7d5913764dbb130aa642ff0bed3d78971bf9f2eef87baf8407fba4a", 0x53}, {&(0x7f0000001500)="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", 0x1000}], 0x6, &(0x7f0000002580)=[{0x10, 0xff, 0x9}, {0x90, 0x11f, 0x5, "cae59f5ab6334f7807b53324723a5a9ff4a1c1650951b11df2fb9e8438d51f48fceaf10357716d08e423df978c461e7594eb71d3178247afc60c1b41d0320bb928e6200dad5803ad27f9b521e72dd3766fdd9513946abad4de0cdbcad7568ac4a1bdee88fdb356d10f91d0443ec18d634ce99d2e594b29c4171287879ffa2656"}, {0x30, 0x111, 0xfffffffffffffe00, "beb5a7843f621df107bbf91f63c3326daa25a32794d8ebecef868e67"}], 0xd0, 0x48000}, 0x20008814) r1 = socket(0x10, 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x40000, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x800000080000002) 07:23:06 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(r1, &(0x7f00000035c0)=[{{&(0x7f00000007c0)=@in={0x2, 0x4e22, @multicast2}, 0x80, &(0x7f0000001940), 0x0, &(0x7f0000001980)}}, {{&(0x7f00000032c0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000003400), 0x0, &(0x7f0000003440)}}], 0x2, 0x0) 07:23:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00002d0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000320080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000dab80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000003c0)="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") setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1}, 0x8) io_setup(0x1, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) sendfile(r2, r1, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile(r2, r1, &(0x7f0000000180)=0xd0000, 0x100000005) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x10, 0x0, 0x3}}, 0x14) sendto$inet(r0, &(0x7f0000000980), 0x0, 0x800, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000380)=@req={0x1f, 0x2, 0x601, 0x40}, 0x10) 07:23:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vga_arbiter\x00', 0x10042, 0x0) syz_open_dev$midi(&(0x7f0000000ac0)='/dev/midi#\x00', 0x1ff, 0xa0000) openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/null\x00', 0x12000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) write$binfmt_aout(r0, &(0x7f0000000300)={{0x10f, 0x1000000000, 0x2, 0x230, 0x2ac, 0xe1, 0x259, 0x1000}, "cd9bc66e32d6b070e76fabbaafccc09540d393b9c6281eb2c402856576a82436de89ac94abbe45bac281ca58116ae95f6068663f5d830b5cc42f2d63f95de8d221", [[], [], [], [], [], [], []]}, 0x761) mount(&(0x7f0000000200)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, &(0x7f0000000180)) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x2, &(0x7f00000001c0)={[{@nfs_export_on='nfs_export=on'}], [{@dont_hash='dont_hash'}, {@appraise='appraise'}]}) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f0000000080)='.', &(0x7f0000000040)='qnx4\x00', 0x1006801, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[0x101, 0x5, 0x0, 0x5, 0x6, 0x2d, 0xffffffffffffffff, 0x5, 0xfffffffffffffff8, 0x78, 0x20, 0x800, 0x2a69, 0x29ec, 0x10000, 0x7f], 0x0, 0x10000}) 07:23:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 369.458462] overlayfs: unrecognized mount option "dont_hash" or missing value [ 369.470126] overlayfs: unrecognized mount option "dont_hash" or missing value 07:23:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0008000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000030080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00K', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000ab0d80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:07 executing program 3: listen(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4d}, 0xffffffffffffffe7) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) preadv(r0, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x6c00000000000700}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xffe3, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x42000) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) getgid() ioctl$sock_bt(r0, 0xdd1f, &(0x7f0000000180)="ac10a3dc4c3cb08c944ab086876c026738160f0f954d27c006c5e4f51edb88204ee8d96ad15f9afd698a3d1720f7684235ae14e09796b814105737c7bb43f18665a11464109a227438b81446954b7fa35943cc119fdaa802660a5553c2b7f216dcd72ade0a9a56c3f6fa3dd01537d9f36818391c727285e9c3746696452fa010d4bebe99161a2c4bf2041076bf83f0b1908e7d736c50528d64573d53384c32d2a8806df75216730af22934a5c9c526b1229d113759717506b699c3") stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 07:23:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00C', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) [ 370.455793] syz-executor0 (12600) used greatest stack depth: 12008 bytes left 07:23:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000003c0)="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") setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1}, 0x8) io_setup(0x1, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) sendfile(r2, r1, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile(r2, r1, &(0x7f0000000180)=0xd0000, 0x100000005) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x10, 0x0, 0x3}}, 0x14) sendto$inet(r0, &(0x7f0000000980), 0x0, 0x800, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000380)=@req={0x1f, 0x2, 0x601, 0x40}, 0x10) 07:23:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000050080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750", 0x4}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00007a0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:07 executing program 3: listen(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4d}, 0xffffffffffffffe7) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) preadv(r0, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x6c00000000000700}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)="1d4e4cc000", 0x20000, 0xffe3, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x42000) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) getgid() ioctl$sock_bt(r0, 0xdd1f, &(0x7f0000000180)="ac10a3dc4c3cb08c944ab086876c026738160f0f954d27c006c5e4f51edb88204ee8d96ad15f9afd698a3d1720f7684235ae14e09796b814105737c7bb43f18665a11464109a227438b81446954b7fa35943cc119fdaa802660a5553c2b7f216dcd72ade0a9a56c3f6fa3dd01537d9f36818391c727285e9c3746696452fa010d4bebe99161a2c4bf2041076bf83f0b1908e7d736c50528d64573d53384c32d2a8806df75216730af22934a5c9c526b1229d113759717506b699c3") stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) 07:23:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750", 0x4}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000ab0d80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000004", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000003c0)="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") setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={0x0, 0x1}, 0x8) io_setup(0x1, &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000900)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) sendfile(r2, r1, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x86100) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendfile(r2, r1, &(0x7f0000000180)=0xd0000, 0x100000005) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x10, 0x0, 0x3}}, 0x14) sendto$inet(r0, &(0x7f0000000980), 0x0, 0x800, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000380)=@req={0x1f, 0x2, 0x601, 0x40}, 0x10) 07:23:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00F', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750", 0x4}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00j', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000780", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000000e", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00007a0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750", 0x4}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000240)="290000002000190000003f000000e80001040000040d001400ea0f0000000500000000000000000000e5d8c2a1190608f92dff87855055276fe425a97447f0583bb6af87f522299e92b2594d3b8227647937b69b6a08e24dbe6c8337ea3b0faedde007be2dbca02579e1474b05c86a0472b6649675cec2392ceeb0263fa5497f", 0x29}], 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x80) rt_sigaction(0x3e, &(0x7f00000001c0)={&(0x7f0000000100)="c4c141d49608000000c441105c186466450fc77000f30fbd29c44291034db1c4e14571d7f6c4217f12cac462a19ea4e100000100a766460ff3cb", {0x3}, 0x40000000, &(0x7f0000000140)="fe4d89c441791066642e64363e410f14a4f27d68bb8dc441785b9f03000000c4e2c990bc03feefffff0f9cbf8e0000008f2828ee1af36666450f5f4f9a673e640f642066400f3a0923ad"}, 0x0, 0x8, &(0x7f0000000200)) write$P9_RREADDIR(r1, &(0x7f0000000240)=ANY=[], 0xff77) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000040)={0x3, r1}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 07:23:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c", 0x6}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 372.282894] syz-executor3 (12714) used greatest stack depth: 11352 bytes left 07:23:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007a80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) 07:23:09 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) select(0x40, &(0x7f00000000c0), &(0x7f0000000380), &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7ab8}, 0xfffffffffffffffd) 07:23:09 executing program 3: r0 = getpid() capget(&(0x7f00000007c0)={0x19980330, r0}, &(0x7f0000000800)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x0) 07:23:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00$', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@dax='dax'}]}) 07:23:09 executing program 3: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x9, 0x101000) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0xe, @pix_mp={0x7f, 0x4, 0x32344d59, 0x0, 0xf, [{0x5, 0xffffffff}, {0xffffffff7fffffff, 0x400}, {0x7ff, 0x6}, {0x8, 0x100000000}, {0x9, 0x9}, {0x6}, {0x7, 0x1}, {0x730914c7, 0xee90}], 0x9, 0x0, 0x1, 0x3, 0x6}}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000080)={0x6, {0x8, 0x5}}) 07:23:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000007480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 372.657525] EXT4-fs: 83 callbacks suppressed [ 372.657535] EXT4-fs (sda1): Cannot specify journal on remount 07:23:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x8000000002, 0x4, 0x7, 0x4, 0x8}, 0x2c) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10001, 0x400001) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x4, 0x2, 0x40, [], &(0x7f0000000040)=0x7}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f00000002c0)={r0, &(0x7f0000000140), &(0x7f0000000200)}, 0x20) 07:23:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf617732743e397b89f26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) syslog(0xb, &(0x7f0000000280)=""/207, 0xcf) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000a40)="153f6234488dd25d766070") write$cgroup_int(r0, &(0x7f0000000200), 0x330) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x78) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x801c581f, &(0x7f0000000000)) [ 372.814405] EXT4-fs (sda1): Cannot specify journal on remount [ 372.847036] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 372.928268] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting 07:23:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000020080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f00000001c0)={[{@journal_path={'journal_path', 0x3d, './file0'}}]}) [ 373.024318] EXT4-fs (sda1): re-mounted. Opts: dax, 07:23:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c", 0x6}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 07:23:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000a, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000003c0)={'NETMAP\x00'}, &(0x7f0000000400)=0x1e) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x4, 0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c00)=[{&(0x7f0000000bc0)="08bd7750374c", 0x6}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xff6c, 0x1, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 373.067160] EXT4-fs (sda1): Cannot specify journal on remount [ 373.126426] EXT4-fs (sda1): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 373.143669] EXT4-fs (sda1): warning: refusing change of dax flag with busy inodes while remounting [ 373.159925] WARNING: CPU: 0 PID: 12870 at fs/dax.c:227 get_unlocked_entry+0x3ac/0x4d0 [ 373.168436] Kernel panic - not syncing: panic_on_warn set ... [ 373.168436] [ 373.175862] CPU: 0 PID: 12870 Comm: syz-executor3 Not tainted 4.19.0+ #87 [ 373.182805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.192168] Call Trace: [ 373.194777] dump_stack+0x244/0x39d [ 373.198433] ? dump_stack_print_info.cold.1+0x20/0x20 [ 373.203665] panic+0x238/0x4e7 [ 373.206885] ? add_taint.cold.5+0x16/0x16 [ 373.211051] ? __warn.cold.8+0x5/0x4a [ 373.214872] ? get_unlocked_entry+0x3ac/0x4d0 [ 373.219380] __warn.cold.8+0x20/0x4a [ 373.223105] ? rcu_softirq_qs+0x20/0x20 [ 373.227092] ? get_unlocked_entry+0x3ac/0x4d0 [ 373.231605] report_bug+0x254/0x2d0 [ 373.235249] do_error_trap+0x11b/0x200 [ 373.239156] do_invalid_op+0x36/0x40 [ 373.242889] ? get_unlocked_entry+0x3ac/0x4d0 [ 373.247400] invalid_op+0x14/0x20 [ 373.250898] RIP: 0010:get_unlocked_entry+0x3ac/0x4d0 [ 373.256012] Code: e8 31 ff 83 e0 01 48 89 c6 48 89 85 10 ff ff ff e8 09 18 96 ff 48 8b 85 10 ff ff ff 48 85 c0 0f 85 34 fe ff ff e8 c4 16 96 ff <0f> 0b e8 bd 16 96 ff 48 b8 00 00 00 00 00 fc ff df 48 03 85 f8 fe [ 373.274920] RSP: 0018:ffff88018025e7b8 EFLAGS: 00010012 [ 373.280289] RAX: 0000000000040000 RBX: ffff88018025ead8 RCX: ffffc90008983000 [ 373.287569] RDX: 0000000000000341 RSI: ffffffff81e94d3c RDI: 0000000000000007 [ 373.294849] RBP: ffff88018025e8c8 R08: ffff88017f862280 R09: ffffed003004bd08 [ 373.302124] R10: ffffed003004bd08 R11: 0000000000000003 R12: dffffc0000000000 [ 373.309417] R13: ffffea0005e01040 R14: ffff88018025e800 R15: ffff88018025e8a0 [ 373.316736] ? get_unlocked_entry+0x3ac/0x4d0 [ 373.321248] ? get_unlocked_entry+0x3ac/0x4d0 [ 373.325764] ? __bpf_trace_dax_writeback_range_class+0x40/0x40 [ 373.331754] ? kasan_check_read+0x11/0x20 [ 373.335914] ? dax_insert_entry+0x760/0x760 [ 373.340254] ? rwlock_bug.part.2+0x90/0x90 [ 373.344506] ? trace_hardirqs_on+0x310/0x310 [ 373.348947] dax_iomap_pte_fault.isra.35+0x8a5/0x37c0 [ 373.354167] ? dax_layout_busy_page+0xc60/0xc60 [ 373.358854] ? __lock_acquire+0x62f/0x4c20 [ 373.363112] ? mark_held_locks+0x130/0x130 [ 373.367370] ? print_usage_bug+0xc0/0xc0 [ 373.371455] ? print_usage_bug+0xc0/0xc0 [ 373.375542] ? __lock_acquire+0x62f/0x4c20 [ 373.379801] ? try_charge+0x7f0/0x1700 [ 373.383715] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 373.388313] ? trace_hardirqs_on+0xbd/0x310 [ 373.392654] ? zap_class+0x640/0x640 [ 373.396383] ? mark_held_locks+0x130/0x130 [ 373.400627] ? zap_class+0x640/0x640 [ 373.404372] ? lock_acquire+0x1ed/0x520 [ 373.408360] ? ext4_dax_huge_fault+0x545/0x730 [ 373.412960] ? lock_release+0xa00/0xa00 [ 373.416946] ? perf_trace_sched_process_exec+0x860/0x860 [ 373.422412] ? lock_downgrade+0x900/0x900 [ 373.426584] ? check_preemption_disabled+0x48/0x280 [ 373.431629] ? down_read+0x8d/0x120 [ 373.435266] ? ext4_dax_huge_fault+0x545/0x730 [ 373.439875] dax_iomap_fault+0x51/0x70 [ 373.443783] ext4_dax_huge_fault+0x565/0x730 [ 373.448214] ? ext4_release_file+0x440/0x440 [ 373.452638] ? mem_cgroup_throttle_swaprate+0x270/0x884 [ 373.458016] ? lock_downgrade+0x900/0x900 [ 373.462180] ? check_preemption_disabled+0x48/0x280 [ 373.467246] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 373.472188] ? kasan_check_read+0x11/0x20 [ 373.476351] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 373.481641] ? rcu_softirq_qs+0x20/0x20 [ 373.485635] ext4_dax_fault+0x17/0x20 [ 373.489461] __do_fault+0x100/0x6b0 [ 373.493104] ? mem_cgroup_throttle_swaprate+0x2eb/0x884 [ 373.498494] ? pmd_devmap_trans_unstable+0x220/0x220 [ 373.503611] ? swap_duplicate+0x80/0x80 [ 373.507602] ? anon_vma_fork+0x820/0x820 [ 373.511686] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 373.517262] __handle_mm_fault+0x141b/0x5be0 [ 373.521698] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 373.526578] ? __switch_to_asm+0x40/0x70 [ 373.530654] ? __switch_to_asm+0x34/0x70 [ 373.534731] ? __switch_to_asm+0x40/0x70 [ 373.538806] ? __switch_to_asm+0x34/0x70 [ 373.543084] ? print_usage_bug+0xc0/0xc0 [ 373.547156] ? __switch_to_asm+0x34/0x70 [ 373.551229] ? __switch_to_asm+0x40/0x70 [ 373.555307] ? __switch_to_asm+0x34/0x70 [ 373.559380] ? __switch_to_asm+0x40/0x70 [ 373.563482] ? zap_class+0x640/0x640 [ 373.567213] ? zap_class+0x640/0x640 [ 373.570945] ? find_held_lock+0x36/0x1c0 [ 373.575033] ? handle_mm_fault+0x42a/0xc70 [ 373.579281] ? lock_downgrade+0x900/0x900 [ 373.583470] ? check_preemption_disabled+0x48/0x280 [ 373.588508] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 373.593464] ? kasan_check_read+0x11/0x20 [ 373.597626] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 373.602913] ? rcu_softirq_qs+0x20/0x20 [ 373.606907] ? trace_hardirqs_off_caller+0x310/0x310 [ 373.612030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 373.617583] ? check_preemption_disabled+0x48/0x280 [ 373.622623] handle_mm_fault+0x54f/0xc70 [ 373.626710] ? __handle_mm_fault+0x5be0/0x5be0 [ 373.631308] ? find_vma+0x34/0x190 [ 373.634874] __do_page_fault+0x5e8/0xe60 [ 373.638963] do_page_fault+0xf2/0x7e0 [ 373.642782] ? vmalloc_sync_all+0x30/0x30 [ 373.646948] ? error_entry+0x76/0xd0 [ 373.650680] ? trace_hardirqs_off_caller+0xbb/0x310 [ 373.655727] ? find_held_lock+0x36/0x1c0 [ 373.659811] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.664676] ? trace_hardirqs_on_caller+0x310/0x310 [ 373.669730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.674801] page_fault+0x1e/0x30 [ 373.678271] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 373.683909] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 373.702829] RSP: 0018:ffff88018025f7d0 EFLAGS: 00010207 [ 373.708221] RAX: 0000000000000004 RBX: 000000000000001c RCX: 0000000000000003 [ 373.715516] RDX: 0000000000000004 RSI: ffff88018025fb40 RDI: 0000000020000000 [ 373.722798] RBP: ffff88018025f808 R08: 00000000000000b8 R09: ffffed003004bf68 [ 373.730076] R10: ffffed003004bf6b R11: 0000000000000003 R12: 000000002000001c [ 373.740309] R13: 0000000020000000 R14: ffff88018025fb40 R15: 00007ffffffff000 [ 373.747620] ? _copy_to_user+0xf6/0x110 [ 373.751612] ext4_ioctl+0x3ed/0x44c0 [ 373.755347] ? ext4_ioctl_group_add+0x560/0x560 [ 373.760030] ? mark_held_locks+0x130/0x130 [ 373.764283] ? zap_class+0x640/0x640 [ 373.768028] ? do_futex+0x249/0x26d0 [ 373.771774] ? find_held_lock+0x36/0x1c0 [ 373.775860] ? __fget+0x4aa/0x740 [ 373.779329] ? lock_downgrade+0x900/0x900 [ 373.783494] ? check_preemption_disabled+0x48/0x280 [ 373.788533] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 373.793490] ? smk_access+0x53b/0x700 [ 373.797303] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 373.802609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 373.808162] ? smack_log+0x423/0x590 [ 373.811896] ? smk_access_entry+0x310/0x310 [ 373.816228] ? __fget+0x4d1/0x740 [ 373.819722] ? smack_privileged+0xd0/0xd0 [ 373.823885] ? perf_trace_sched_process_exec+0x860/0x860 [ 373.829353] ? ext4_ioctl_group_add+0x560/0x560 [ 373.834040] do_vfs_ioctl+0x1de/0x1720 [ 373.837972] ? ioctl_preallocate+0x300/0x300 [ 373.842397] ? smk_curacc+0x7f/0xa0 [ 373.846052] ? smack_file_ioctl+0x210/0x3c0 [ 373.850392] ? fget_raw+0x20/0x20 [ 373.853867] ? smack_file_lock+0x2e0/0x2e0 [ 373.858130] ? do_syscall_64+0x9a/0x820 [ 373.862116] ? do_syscall_64+0x9a/0x820 [ 373.866113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 373.871666] ? security_file_ioctl+0x94/0xc0 [ 373.876102] ksys_ioctl+0xa9/0xd0 [ 373.879574] __x64_sys_ioctl+0x73/0xb0 [ 373.883488] do_syscall_64+0x1b9/0x820 [ 373.887394] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 373.892773] ? syscall_return_slowpath+0x5e0/0x5e0 [ 373.897728] ? trace_hardirqs_on_caller+0x310/0x310 [ 373.902758] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 373.907795] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 373.914481] ? __switch_to_asm+0x40/0x70 [ 373.918557] ? __switch_to_asm+0x34/0x70 [ 373.922639] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.927506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.932712] RIP: 0033:0x457569 [ 373.935939] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.954847] RSP: 002b:00007f0efb87dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 373.962567] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 373.969848] RDX: 0000000020000000 RSI: 00000000801c581f RDI: 0000000000000003 [ 373.977126] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 373.984402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0efb87e6d4 [ 373.991676] R13: 00000000004bf929 R14: 00000000004cfa80 R15: 00000000ffffffff [ 374.000292] Kernel Offset: disabled [ 374.004139] Rebooting in 86400 seconds..