0, space 0, times 0 [ 409.008729] CPU: 1 PID: 5551 Comm: syz-executor.3 Not tainted 5.10.214 #1 [ 409.009425] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 409.010344] Call Trace: [ 409.010627] dump_stack+0x107/0x167 [ 409.011013] should_fail.cold+0x5/0xa [ 409.011421] ? create_object.isra.0+0x3a/0xa20 [ 409.011907] should_failslab+0x5/0x20 [ 409.012311] kmem_cache_alloc+0x5b/0x310 [ 409.012747] create_object.isra.0+0x3a/0xa20 [ 409.013210] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 409.013748] __kmalloc+0x16e/0x390 [ 409.014160] genl_family_rcv_msg_attrs_parse.constprop.0+0xdb/0x280 [ 409.014805] ? genl_rcv_msg+0x3f8/0x5a0 [ 409.015216] genl_family_rcv_msg_doit+0xda/0x330 [ 409.015701] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 409.016372] ? memset+0x20/0x50 [ 409.016717] ? genl_op_from_small+0x23/0x3d0 [ 409.017165] ? genl_get_cmd+0x3cf/0x480 [ 409.017577] genl_rcv_msg+0x33c/0x5a0 [ 409.017968] ? genl_get_cmd+0x480/0x480 [ 409.018379] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 409.018878] ? lock_release+0x680/0x680 [ 409.019280] ? netlink_deliver_tap+0xf4/0xcc0 [ 409.019740] netlink_rcv_skb+0x14b/0x430 [ 409.020152] ? genl_get_cmd+0x480/0x480 [ 409.020593] ? netlink_ack+0xab0/0xab0 [ 409.021000] ? netlink_deliver_tap+0x1c4/0xcc0 [ 409.021462] ? is_vmalloc_addr+0x7b/0xb0 [ 409.021880] genl_rcv+0x24/0x40 [ 409.022215] netlink_unicast+0x549/0x7f0 [ 409.022633] ? netlink_attachskb+0x870/0x870 [ 409.023088] netlink_sendmsg+0x90f/0xdf0 [ 409.023506] ? netlink_unicast+0x7f0/0x7f0 [ 409.023944] ? netlink_unicast+0x7f0/0x7f0 [ 409.024375] __sock_sendmsg+0x154/0x190 [ 409.024827] ____sys_sendmsg+0x70d/0x870 [ 409.025245] ? sock_write_iter+0x3d0/0x3d0 [ 409.025713] ? do_recvmmsg+0x6d0/0x6d0 [ 409.026111] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 409.026682] ? lock_downgrade+0x6d0/0x6d0 [ 409.027108] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 409.027692] ___sys_sendmsg+0xf3/0x170 [ 409.028089] ? sendmsg_copy_msghdr+0x160/0x160 [ 409.028597] ? lock_downgrade+0x6d0/0x6d0 10:57:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 409.029023] ? find_held_lock+0x2c/0x110 [ 409.029680] ? __fget_files+0x296/0x4c0 [ 409.030122] ? __fget_light+0xea/0x290 [ 409.030552] __sys_sendmsg+0xe5/0x1b0 [ 409.030973] ? __sys_sendmsg_sock+0x40/0x40 [ 409.031441] ? rcu_read_lock_any_held+0x75/0xa0 [ 409.031928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 409.032521] ? syscall_enter_from_user_mode+0x1d/0x50 [ 409.033063] ? trace_hardirqs_on+0x5b/0x180 [ 409.033556] do_syscall_64+0x33/0x40 [ 409.033945] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 409.034523] RIP: 0033:0x7f4e8b751b19 [ 409.034908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 409.036901] RSP: 002b:00007f4e88cc7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 409.037671] RAX: ffffffffffffffda RBX: 00007f4e8b864f60 RCX: 00007f4e8b751b19 [ 409.038436] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000000005 [ 409.039213] RBP: 00007f4e88cc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 409.039998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.040767] R13: 00007ffcc3f806bf R14: 00007f4e88cc7300 R15: 0000000000022000 10:57:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 10) [ 409.219148] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 409.245620] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 409.247473] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 409.259886] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 409.262915] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 409.267869] FAULT_INJECTION: forcing a failure. [ 409.267869] name failslab, interval 1, probability 0, space 0, times 0 [ 409.270191] CPU: 1 PID: 5566 Comm: syz-executor.3 Not tainted 5.10.214 #1 [ 409.270898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 409.271796] Call Trace: [ 409.272109] dump_stack+0x107/0x167 [ 409.272520] should_fail.cold+0x5/0xa [ 409.272943] ? __alloc_skb+0x6d/0x5b0 [ 409.273372] should_failslab+0x5/0x20 [ 409.273795] kmem_cache_alloc_node+0x55/0x330 [ 409.274298] __alloc_skb+0x6d/0x5b0 [ 409.274710] netlbl_mgmt_listdef+0xba/0x5f0 [ 409.275190] genl_family_rcv_msg_doit+0x22d/0x330 [ 409.275718] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 409.276467] ? genl_op_from_small+0x23/0x3d0 [ 409.276963] ? genl_get_cmd+0x3cf/0x480 [ 409.277414] genl_rcv_msg+0x33c/0x5a0 [ 409.277844] ? genl_get_cmd+0x480/0x480 [ 409.278281] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 409.278819] ? lock_release+0x680/0x680 [ 409.279283] ? netlink_deliver_tap+0xf4/0xcc0 [ 409.279783] netlink_rcv_skb+0x14b/0x430 [ 409.280233] ? genl_get_cmd+0x480/0x480 [ 409.280692] ? netlink_ack+0xab0/0xab0 [ 409.281136] ? netlink_deliver_tap+0x1c4/0xcc0 [ 409.281634] ? is_vmalloc_addr+0x7b/0xb0 [ 409.282096] genl_rcv+0x24/0x40 [ 409.282463] netlink_unicast+0x549/0x7f0 [ 409.282926] ? netlink_attachskb+0x870/0x870 [ 409.283420] netlink_sendmsg+0x90f/0xdf0 [ 409.283912] ? netlink_unicast+0x7f0/0x7f0 [ 409.284386] ? netlink_unicast+0x7f0/0x7f0 [ 409.284867] __sock_sendmsg+0x154/0x190 [ 409.285314] ____sys_sendmsg+0x70d/0x870 [ 409.285762] ? sock_write_iter+0x3d0/0x3d0 [ 409.286231] ? do_recvmmsg+0x6d0/0x6d0 [ 409.286665] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 409.287243] ? lock_downgrade+0x6d0/0x6d0 [ 409.287704] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 409.288277] ___sys_sendmsg+0xf3/0x170 [ 409.288764] ? sendmsg_copy_msghdr+0x160/0x160 [ 409.289284] ? lock_downgrade+0x6d0/0x6d0 [ 409.289743] ? find_held_lock+0x2c/0x110 [ 409.290209] ? __fget_files+0x296/0x4c0 [ 409.290672] ? __fget_light+0xea/0x290 [ 409.291113] __sys_sendmsg+0xe5/0x1b0 [ 409.291537] ? __sys_sendmsg_sock+0x40/0x40 [ 409.292018] ? rcu_read_lock_any_held+0x75/0xa0 [ 409.292560] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 409.293191] ? syscall_enter_from_user_mode+0x1d/0x50 [ 409.293755] ? trace_hardirqs_on+0x5b/0x180 [ 409.294242] do_syscall_64+0x33/0x40 [ 409.294658] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 409.295222] RIP: 0033:0x7f4e8b751b19 [ 409.295641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 409.297643] RSP: 002b:00007f4e88cc7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 409.298476] RAX: ffffffffffffffda RBX: 00007f4e8b864f60 RCX: 00007f4e8b751b19 [ 409.299248] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000000005 [ 409.300022] RBP: 00007f4e88cc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 409.300806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 409.301587] R13: 00007ffcc3f806bf R14: 00007f4e88cc7300 R15: 0000000000022000 [ 409.305635] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 409.307116] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 409.311929] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 409.329395] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 10:57:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) [ 409.342840] EXT4-fs (loop4): Unrecognized mount option "" or missing value 10:57:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 409.378659] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 409.506172] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 409.509509] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 409.653846] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 409.655944] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 409.738281] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 409.741507] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 409.874417] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 409.887573] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 409.974401] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 409.979930] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 10:57:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:57:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 11) [ 421.634415] FAULT_INJECTION: forcing a failure. [ 421.634415] name failslab, interval 1, probability 0, space 0, times 0 [ 421.635357] CPU: 1 PID: 5607 Comm: syz-executor.3 Not tainted 5.10.214 #1 [ 421.635869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 421.636500] Call Trace: [ 421.636715] dump_stack+0x107/0x167 [ 421.636994] should_fail.cold+0x5/0xa [ 421.637301] ? create_object.isra.0+0x3a/0xa20 [ 421.637687] should_failslab+0x5/0x20 [ 421.637980] kmem_cache_alloc+0x5b/0x310 [ 421.638301] create_object.isra.0+0x3a/0xa20 [ 421.638639] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 421.639029] kmem_cache_alloc_node+0x169/0x330 [ 421.639417] __alloc_skb+0x6d/0x5b0 [ 421.639703] netlbl_mgmt_listdef+0xba/0x5f0 [ 421.640035] genl_family_rcv_msg_doit+0x22d/0x330 [ 421.640411] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 421.640927] ? genl_op_from_small+0x23/0x3d0 [ 421.641302] ? genl_get_cmd+0x3cf/0x480 [ 421.641610] genl_rcv_msg+0x33c/0x5a0 [ 421.641907] ? genl_get_cmd+0x480/0x480 [ 421.642214] ? netlbl_mgmt_listall_cb+0x360/0x360 [ 421.642595] ? lock_release+0x680/0x680 [ 421.642896] ? netlink_deliver_tap+0xf4/0xcc0 [ 421.643281] netlink_rcv_skb+0x14b/0x430 [ 421.643596] ? genl_get_cmd+0x480/0x480 [ 421.643925] ? netlink_ack+0xab0/0xab0 [ 421.644225] ? netlink_deliver_tap+0x1c4/0xcc0 [ 421.644588] ? is_vmalloc_addr+0x7b/0xb0 [ 421.644932] genl_rcv+0x24/0x40 [ 421.645203] netlink_unicast+0x549/0x7f0 [ 421.645530] ? netlink_attachskb+0x870/0x870 [ 421.645867] netlink_sendmsg+0x90f/0xdf0 [ 421.646180] ? netlink_unicast+0x7f0/0x7f0 [ 421.646586] ? netlink_unicast+0x7f0/0x7f0 [ 421.646992] __sock_sendmsg+0x154/0x190 [ 421.647374] ____sys_sendmsg+0x70d/0x870 [ 421.647767] ? sock_write_iter+0x3d0/0x3d0 [ 421.648162] ? do_recvmmsg+0x6d0/0x6d0 [ 421.648533] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 421.649020] ? lock_downgrade+0x6d0/0x6d0 [ 421.649356] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 421.649759] ___sys_sendmsg+0xf3/0x170 [ 421.650085] ? sendmsg_copy_msghdr+0x160/0x160 [ 421.650449] ? lock_downgrade+0x6d0/0x6d0 [ 421.650797] ? find_held_lock+0x2c/0x110 [ 421.651115] ? __fget_files+0x296/0x4c0 [ 421.651431] ? __fget_light+0xea/0x290 [ 421.651733] __sys_sendmsg+0xe5/0x1b0 [ 421.652049] ? __sys_sendmsg_sock+0x40/0x40 [ 421.652413] ? rcu_read_lock_any_held+0x75/0xa0 [ 421.652792] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 421.653190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 421.653621] ? trace_hardirqs_on+0x5b/0x180 [ 421.653981] do_syscall_64+0x33/0x40 [ 421.654301] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 421.654729] RIP: 0033:0x7f4e8b751b19 [ 421.655037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 421.656564] RSP: 002b:00007f4e88cc7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 421.657204] RAX: ffffffffffffffda RBX: 00007f4e8b864f60 RCX: 00007f4e8b751b19 [ 421.657794] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000000005 [ 421.658391] RBP: 00007f4e88cc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 421.658975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 421.659565] R13: 00007ffcc3f806bf R14: 00007f4e88cc7300 R15: 0000000000022000 10:57:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) (fail_nth: 12) [ 421.916899] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 421.921266] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 421.924388] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 421.926377] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 421.929789] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 421.931555] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 421.938792] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 422.015673] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 422.017154] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 422.102469] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 422.105182] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 10:57:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:57:29 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x2, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 437.320340] EXT4-fs (loop0): Unrecognized mount option "" or missing value 10:57:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 437.343518] EXT4-fs (loop7): Unrecognized mount option "" or missing value [ 437.360331] EXT4-fs (loop5): Unrecognized mount option "" or missing value 10:57:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 437.377490] EXT4-fs (loop6): Unrecognized mount option "" or missing value 10:57:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:57:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x8, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x9, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 438.315810] EXT4-fs (loop6): Unrecognized mount option "" or missing value [ 438.342562] EXT4-fs (loop2): Unrecognized mount option "" or missing value 10:57:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xf, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:57:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:57:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 438.485845] EXT4-fs (loop7): Unrecognized mount option "" or missing value [ 438.509638] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 438.742080] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 438.746174] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 438.762441] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 438.794913] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 438.813857] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 10:57:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:57:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:57:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:44 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x60, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:57:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:44 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xf0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:44 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x300, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 451.613753] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 451.616315] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 451.678150] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 451.709003] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 451.711060] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 451.716965] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 451.718367] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 451.729991] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 451.731409] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:57:45 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 451.782566] EXT4-fs (loop6): Unrecognized mount option "" or missing value 10:57:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x900, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 451.882882] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 451.886601] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 452.195537] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 452.207110] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 452.346487] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 452.357592] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 10:57:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:57:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xf00, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:57:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:57:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:57:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:57:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:57:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x6000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 465.765669] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 465.818127] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 465.820047] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 10:57:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 465.872230] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 10:57:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xf000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 465.893497] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 465.921668] EXT4-fs (loop2): Unrecognized mount option "" or missing value 10:57:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 465.971331] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 465.977983] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 465.982356] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 10:57:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) [ 466.021217] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 10:57:59 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x30000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 466.041185] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 466.118392] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 466.119643] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 466.439893] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 466.443436] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 466.929549] EXT4-fs: failed to create workqueue [ 466.930031] EXT4-fs (loop0): mount failed 10:58:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r0, 0x5, r3, 0x7) 10:58:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:58:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:58:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:58:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x34000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:58:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x80000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 482.293535] EXT4-fs: failed to create workqueue [ 482.294282] EXT4-fs (loop7): mount failed [ 482.318018] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 482.323020] EXT4-fs: failed to create workqueue [ 482.323799] EXT4-fs (loop1): mount failed [ 482.335312] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 482.347978] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 482.349292] EXT4-fs (loop6): Unrecognized mount option "" or missing value [ 482.354725] EXT4-fs (loop0): Unrecognized mount option "" or missing value 10:58:30 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r0, 0x5, r3, 0x7) 10:58:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) 10:58:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:58:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:30 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x400300, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:58:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:58:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xf0ffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x1000000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x2000000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 498.230512] EXT4-fs (loop6): Unrecognized mount option "" or missing value [ 498.298604] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 498.341739] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 498.362405] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 498.367594] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 498.384643] EXT4-fs: failed to create workqueue [ 498.385043] EXT4-fs (loop7): mount failed [ 498.388641] EXT4-fs: failed to create workqueue [ 498.389012] EXT4-fs (loop1): mount failed 10:58:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:58:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:58:31 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:58:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x3000000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:31 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r0, 0x5, r3, 0x7) 10:58:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 498.544918] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 498.547304] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 10:58:31 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x9000000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:58:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xf000000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 498.775660] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 498.797227] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 498.799841] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 498.809846] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 498.832608] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 498.845031] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 10:58:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x1dae88b3, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 498.896265] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 498.903441] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 498.911580] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 498.915822] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 10:58:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 498.920456] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 498.923032] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 10:58:32 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 499.235458] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 499.236762] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 499.331133] EXT4-fs (loop7): Unrecognized mount option "" or missing value [ 499.346111] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 499.347851] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 499.656978] EXT4-fs (loop2): Unrecognized mount option "" or missing value 10:58:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:58:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:58:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x60000000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 10:58:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:58:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:58:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:58:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x9effffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 513.114412] EXT4-fs (loop5): Unrecognized mount option "" or missing value 10:58:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xb388ae1d, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 513.455591] EXT4-fs (loop7): Unrecognized mount option "" or missing value [ 513.459262] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 513.484195] EXT4-fs (loop2): Unrecognized mount option "" or missing value 10:58:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xf0ffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:58:46 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xfcffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 513.538137] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 513.541649] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 513.543049] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 513.546623] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 513.690712] EXT4-fs (loop0): Unrecognized mount option "" or missing value 10:58:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xfffff000, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 513.804036] EXT4-fs (loop5): Unrecognized mount option "" or missing value 10:59:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xffffff7f, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:59:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:59:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:00 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xffffff9e, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:59:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xfffffff0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 10:59:00 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xfffffffc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 527.697263] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 527.794767] EXT4-fs (loop7): Unrecognized mount option "" or missing value [ 527.808657] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 527.857242] EXT4-fs: error -4 creating inode table initialization thread 10:59:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0xffffffff, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 527.867870] EXT4-fs: failed to create workqueue [ 527.868348] EXT4-fs (loop6): mount failed [ 527.871174] EXT4-fs (loop4): mount failed [ 527.871386] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 527.882094] EXT4-fs (loop5): Unrecognized mount option "" or missing value 10:59:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 528.039696] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 528.041044] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 528.791046] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 528.793446] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 10:59:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:14 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 10:59:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0xf, r2, 0x1}, 0x14}}, 0x0) 10:59:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0xc0, r2, 0x1}, 0x14}}, 0x0) 10:59:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0xec0, r2, 0x1}, 0x14}}, 0x0) 10:59:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) 10:59:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 541.889028] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 541.891948] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 542.475929] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 542.504907] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 542.520690] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 542.524466] EXT4-fs: failed to create workqueue [ 542.525244] EXT4-fs (loop6): mount failed [ 542.685940] EXT4-fs (loop7): Unrecognized mount option "" or missing value 10:59:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x33fe0, r2, 0x1}, 0x14}}, 0x0) 10:59:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) [ 555.163883] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 555.165787] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 10:59:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) [ 555.581263] EXT4-fs (loop0): Unrecognized mount option "" or missing value 10:59:29 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x200005d4, r2, 0x1}, 0x14}}, 0x0) 10:59:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) [ 555.696009] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 3 [ 555.701946] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 10:59:29 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 555.843223] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 555.856613] EXT4-fs: failed to create workqueue [ 555.857279] EXT4-fs (loop7): mount failed [ 555.896680] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 555.901691] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 556.163789] EXT4-fs (loop1): Unrecognized mount option "" or missing value 10:59:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x7ffff000, r2, 0x1}, 0x14}}, 0x0) 10:59:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) 10:59:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:41 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0xfffffdef, r2, 0x1}, 0x14}}, 0x0) [ 568.167987] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 568.217062] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 568.218501] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 568.221076] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 10:59:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 568.302512] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 568.306665] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 10:59:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 568.394022] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 568.401827] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 10:59:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x6}, 0x14}}, 0x0) 10:59:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x8}, 0x14}}, 0x0) [ 568.659476] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 568.661194] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 568.670401] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 568.672835] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 568.734474] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 568.744989] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 568.790240] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 568.798400] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 568.821580] EXT4-fs (loop1): Unrecognized mount option "" or missing value [ 568.939378] EXT4-fs (loop0): Unrecognized mount option "" or missing value 10:59:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x500}, 0x14}}, 0x0) 10:59:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 10:59:54 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:59:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 581.403465] EXT4-fs (loop7): Unrecognized mount option "" or missing value [ 581.412698] EXT4-fs (loop1): Unrecognized mount option "" or missing value 10:59:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x2}, 0x14}}, 0x0) [ 581.447118] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 581.448326] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 581.569872] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 581.572799] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 581.574732] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 581.575966] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 10:59:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x3}, 0x14}}, 0x0) [ 581.789023] EXT4-fs (loop5): Unrecognized mount option "" or missing value 10:59:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x8}, 0x14}}, 0x0) 10:59:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:59:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x9}, 0x14}}, 0x0) [ 582.016436] EXT4-fs (loop1): Unrecognized mount option "" or missing value 10:59:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 10:59:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xf}, 0x14}}, 0x0) 10:59:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 582.174497] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 582.184283] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 582.185328] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 582.191139] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 582.218995] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 582.227661] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 582.238295] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 10:59:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 582.249061] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 582.320488] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 582.321792] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 10:59:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x60}, 0x14}}, 0x0) 10:59:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) [ 582.506829] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 582.510884] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 10:59:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 10:59:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xf0}, 0x14}}, 0x0) [ 582.590908] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 582.641708] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 582.643934] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 582.702049] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 582.704155] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 582.757770] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 582.760509] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:00:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:00:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:08 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x300}, 0x14}}, 0x0) 11:00:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) [ 596.087839] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 596.112487] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 596.114126] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 596.137982] EXT4-fs: failed to create workqueue [ 596.138791] EXT4-fs (loop1): mount failed [ 596.169727] EXT4-fs: failed to create workqueue [ 596.170456] EXT4-fs (loop6): mount failed 11:00:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) 11:00:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x900}, 0x14}}, 0x0) 11:00:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) 11:00:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:00:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xf00}, 0x14}}, 0x0) [ 609.274754] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 609.278693] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 609.286662] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 609.287967] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 609.319672] EXT4-fs (loop4): Unrecognized mount option "" or missing value 11:00:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) 11:00:22 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:00:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x6000}, 0x14}}, 0x0) [ 609.499713] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 609.501784] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 609.503744] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 609.504963] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:00:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 609.534094] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 609.536702] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:00:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 609.614951] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 609.622122] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 609.679338] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 609.680754] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 609.744714] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 609.746357] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 609.890097] EXT4-fs: failed to create workqueue [ 609.890539] EXT4-fs (loop1): mount failed [ 609.911482] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 609.912692] EXT4-fs (loop4): Unrecognized mount option "" or missing value 11:00:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xf000}, 0x14}}, 0x0) 11:00:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:00:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r2, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) 11:00:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:00:37 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 624.246593] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 624.248873] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:00:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x30000}, 0x14}}, 0x0) [ 624.340136] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 624.341485] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:00:37 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 624.457212] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 624.464192] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 624.473569] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 624.474907] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:00:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:00:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:00:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x34000}, 0x14}}, 0x0) 11:00:37 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 624.623742] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 624.632134] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 624.635744] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 11:00:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x80000}, 0x14}}, 0x0) [ 624.660365] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 624.663688] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 624.667315] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:00:38 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 624.735668] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 624.740168] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:00:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 624.838869] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 624.842173] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 625.442853] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 625.461920] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 625.463890] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 625.665581] EXT4-fs (loop5): Unrecognized mount option "" or missing value [ 626.430260] EXT4-fs (loop2): Unrecognized mount option "" or missing value 11:00:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:54 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:00:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x400300}, 0x14}}, 0x0) 11:00:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) 11:00:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r5, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 641.214856] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 641.216660] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 641.221187] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 641.225231] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:00:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xf0ffff}, 0x14}}, 0x0) [ 641.315531] EXT4-fs (loop7): Unrecognized mount option "" or missing value [ 641.331731] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 641.333271] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:00:54 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:00:54 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:00:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 641.500428] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 641.507102] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:00:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x1000000}, 0x14}}, 0x0) [ 641.525873] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 641.534444] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 641.544356] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 11:00:54 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x2000000}, 0x14}}, 0x0) [ 641.558523] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 641.679421] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 641.680800] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 641.701232] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 641.779178] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:01:07 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) 11:01:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:01:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:07 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 654.145663] perf: interrupt took too long (3995 > 3977), lowering kernel.perf_event_max_sample_rate to 50000 [ 654.146732] perf: interrupt took too long (3995 > 3977), lowering kernel.perf_event_max_sample_rate to 50000 11:01:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x3000000}, 0x14}}, 0x0) 11:01:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 654.156494] perf: interrupt took too long (4999 > 4993), lowering kernel.perf_event_max_sample_rate to 40000 [ 654.160543] perf: interrupt took too long (6252 > 6248), lowering kernel.perf_event_max_sample_rate to 31000 [ 654.201834] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 654.205180] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:01:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x9000000}, 0x14}}, 0x0) [ 654.216215] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 654.222068] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 654.223956] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 654.247494] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 654.251948] EXT4-fs (loop5): Unrecognized mount option "" or missing value 11:01:07 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xf000000}, 0x14}}, 0x0) [ 654.327974] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 11:01:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:07 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 654.347459] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 654.351984] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 654.372858] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:01:07 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 654.427776] perf: interrupt took too long (7820 > 7815), lowering kernel.perf_event_max_sample_rate to 25000 11:01:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 654.453680] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 654.457475] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 654.479000] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 654.495411] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 654.523657] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 654.526560] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 654.564749] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 654.583937] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:01:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x1dae88b3}, 0x14}}, 0x0) 11:01:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:01:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:21 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:21 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) [ 668.361229] perf: interrupt took too long (9781 > 9775), lowering kernel.perf_event_max_sample_rate to 20000 11:01:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x60000000}, 0x14}}, 0x0) [ 668.386869] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 668.392788] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 668.404717] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 668.411344] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:01:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 668.437503] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 668.439237] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 668.442206] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 668.447529] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:01:21 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x9effffff}, 0x14}}, 0x0) [ 668.481825] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 668.494836] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 668.495246] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:01:21 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 668.517367] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:01:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 668.531663] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 668.538376] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 668.598887] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 11:01:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:22 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 668.630496] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:01:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xb388ae1d}, 0x14}}, 0x0) 11:01:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 668.684930] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 668.693998] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 668.705109] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 668.710565] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:01:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 668.756953] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 11:01:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xf0ffffff}, 0x14}}, 0x0) [ 668.763157] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 668.767894] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:01:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 668.774937] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 668.775385] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 668.784980] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 668.888531] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 668.889828] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 668.924192] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 668.936698] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:01:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:01:35 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xfcffffff}, 0x14}}, 0x0) 11:01:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:01:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xfffff000}, 0x14}}, 0x0) [ 682.312096] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 682.313855] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 682.314507] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 682.316341] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 682.316665] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 682.319703] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 682.324417] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 682.326229] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 682.356467] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 682.363097] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 682.364229] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 682.364241] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 682.366482] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 682.371320] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:01:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:01:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) [ 682.486857] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 682.489250] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 682.518911] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 682.520845] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 682.536633] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 682.546593] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:01:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xffffff7f}, 0x14}}, 0x0) 11:01:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:01:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 11:01:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:01:56 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 702.814559] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 702.816533] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:01:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xffffff9e}, 0x14}}, 0x0) [ 702.847476] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 702.848449] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 702.853734] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 702.857650] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 702.916808] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 702.931384] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:01:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:01:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 702.996318] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 702.998739] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:01:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 703.082231] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 11:01:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xfffffff0}, 0x14}}, 0x0) [ 703.101574] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 703.122706] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 11:01:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) [ 703.149049] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 703.154540] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 703.163142] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:01:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 703.273681] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 11:01:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 703.307030] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:01:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:01:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:01:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xfffffffc}, 0x14}}, 0x0) [ 703.380666] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 703.396390] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 703.409407] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 703.422876] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 703.434962] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 703.443959] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 703.467896] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 703.468946] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 703.480683] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 703.483203] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 703.563645] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 703.572282] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:02:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:02:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:02:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 11:02:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0xffffffff}, 0x14}}, 0x0) [ 715.788519] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 715.789829] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 715.832231] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 715.836425] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 715.840396] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 715.844578] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 715.845776] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 715.848526] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 715.872594] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 715.881712] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 715.882904] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 715.888268] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 715.918691] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 715.922994] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:02:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) 11:02:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:02:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 11:02:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:02:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x2}, 0x14}}, 0x0) [ 729.253183] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 729.256175] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 729.276044] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 729.277385] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 729.291356] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 729.299390] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 729.326698] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 729.331838] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 729.339018] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 729.341306] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 729.388903] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 729.397614] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:02:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x3}, 0x14}}, 0x0) [ 729.443051] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 729.448488] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:02:22 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:02:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:02:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 11:02:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 729.682599] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 729.688572] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 729.699301] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 729.711250] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 11:02:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x8}, 0x14}}, 0x0) 11:02:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 729.748335] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 729.752504] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:02:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 729.872955] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 729.895418] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 11:02:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 729.909680] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 729.916787] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:02:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) [ 729.929658] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 729.932154] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:02:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x9}, 0x14}}, 0x0) [ 730.030153] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 730.049449] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 730.097807] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 730.118831] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 730.121262] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 730.129229] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 730.154618] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 730.157818] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:02:35 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:02:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:35 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xf}, 0x14}}, 0x0) 11:02:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 11:02:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:02:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 742.646040] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 742.649165] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 742.673508] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 742.694069] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 742.695350] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 742.704310] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:02:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x60}, 0x14}}, 0x0) [ 742.749590] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 742.750846] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 742.760107] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 742.761907] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 742.765253] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 11:02:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 742.774475] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:02:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 742.816294] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 11:02:36 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 742.828459] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:02:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xf0}, 0x14}}, 0x0) 11:02:36 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r4, 0x7) 11:02:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 743.038340] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 743.039556] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 743.078070] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 743.081813] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:02:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:02:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:02:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:02:49 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x300}, 0x14}}, 0x0) 11:02:49 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:02:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 755.772946] EXT4-fs error (device loop0): ext4_orphan_get:1417: comm syz-executor.0: bad orphan inode 301979167 [ 755.774248] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 755.800336] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 755.803365] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 755.807226] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 755.808554] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 755.846696] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 755.852162] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 755.870603] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 755.877876] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 755.879468] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 755.898844] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 755.924805] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 755.943209] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:03:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x900}, 0x14}}, 0x0) 11:03:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:03:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:03:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xf00}, 0x14}}, 0x0) [ 768.913796] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 768.913881] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 768.916642] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 768.917489] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 768.921590] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 768.924836] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 768.929799] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 768.946203] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 768.952345] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 768.957929] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 11:03:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 768.966546] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 768.968805] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:03:02 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x6000}, 0x14}}, 0x0) 11:03:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:03:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:03:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:02 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 769.068766] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 769.070744] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:03:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:02 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xf000}, 0x14}}, 0x0) [ 769.208726] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 769.219852] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 769.251526] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 769.253700] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 769.292768] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 769.296233] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:03:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:03:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x30000}, 0x14}}, 0x0) 11:03:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:03:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 781.775774] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 781.778350] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 781.782527] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 781.783745] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 781.785704] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 781.788342] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 781.855421] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 781.856929] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 11:03:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x34000}, 0x14}}, 0x0) 11:03:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:03:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 781.969412] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 11:03:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 782.002241] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:03:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x80000}, 0x14}}, 0x0) [ 782.095582] EXT4-fs error (device loop7): ext4_orphan_get:1417: comm syz-executor.7: bad orphan inode 301979167 [ 782.104426] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 782.110695] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 782.119345] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 782.174488] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 782.212108] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz-executor.6: bad orphan inode 301979167 [ 782.219347] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 782.237915] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 782.243383] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:03:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:03:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x400300}, 0x14}}, 0x0) 11:03:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 795.450272] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 795.453917] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:03:28 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xf0ffff}, 0x14}}, 0x0) [ 795.485828] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 795.492567] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 795.553206] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 11:03:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 795.561487] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 795.596312] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 795.600705] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:03:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:29 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x1000000}, 0x14}}, 0x0) 11:03:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:03:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 795.720125] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 795.722665] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 795.775722] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 795.777667] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 795.791554] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 795.793827] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:03:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) 11:03:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:03:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:03:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x2000000}, 0x14}}, 0x0) 11:03:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:42 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 808.927377] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 808.931376] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 808.933627] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 808.947634] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 808.961753] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 11:03:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x3000000}, 0x14}}, 0x0) [ 808.992869] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 808.998535] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:03:42 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) 11:03:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 809.027101] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 11:03:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 809.214743] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 809.230271] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 809.312580] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 809.327267] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:03:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:03:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x9000000}, 0x14}}, 0x0) 11:03:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:03:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r2, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r4, 0x7) 11:03:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xf000000}, 0x14}}, 0x0) [ 821.962328] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 821.969342] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 821.971440] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 821.988491] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 821.993642] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 821.995183] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 821.999504] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 822.010713] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:03:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 822.035635] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 822.054624] EXT4-fs (loop0): get root inode failed [ 822.055700] EXT4-fs (loop0): mount failed 11:03:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:03:55 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:55 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x1dae88b3}, 0x14}}, 0x0) 11:03:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:03:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:03:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 822.201335] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 822.203279] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 822.344702] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 822.348178] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:04:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:04:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x60000000}, 0x14}}, 0x0) 11:04:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:04:09 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x9effffff}, 0x14}}, 0x0) 11:04:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 836.503730] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 836.504745] EXT4-fs error (device loop4): ext4_orphan_get:1417: comm syz-executor.4: bad orphan inode 301979167 [ 836.507389] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 836.508208] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 836.518454] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 11:04:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 836.523358] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 836.527240] EXT4-fs (loop0): get root inode failed [ 836.528252] EXT4-fs (loop0): mount failed [ 836.529360] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 836.538585] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 836.548115] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:04:10 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:04:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xb388ae1d}, 0x14}}, 0x0) 11:04:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 836.783228] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 836.799141] EXT4-fs (loop0): get root inode failed [ 836.799638] EXT4-fs (loop0): mount failed [ 836.838756] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 836.842129] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:04:23 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xf0ffffff}, 0x14}}, 0x0) 11:04:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:04:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:04:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 850.288880] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 850.293596] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 850.335425] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 850.343691] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:04:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:04:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 850.369797] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated 11:04:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xfcffffff}, 0x14}}, 0x0) [ 850.396279] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated [ 850.415272] EXT4-fs (loop0): get root inode failed [ 850.416271] EXT4-fs (loop0): mount failed [ 850.428794] EXT4-fs (loop7): get root inode failed [ 850.429898] EXT4-fs (loop7): mount failed [ 850.440495] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 850.463971] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:04:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xfffff000}, 0x14}}, 0x0) 11:04:23 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 850.600442] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated 11:04:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 850.609340] EXT4-fs (loop6): get root inode failed [ 850.610294] EXT4-fs (loop6): mount failed 11:04:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 850.709873] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 850.714213] EXT4-fs (loop0): get root inode failed [ 850.717216] EXT4-fs (loop0): mount failed [ 850.732774] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 850.739290] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 850.788640] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 850.792715] EXT4-fs (loop6): get root inode failed [ 850.793789] EXT4-fs (loop6): mount failed [ 850.804939] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 850.811819] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 850.854418] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated [ 850.866017] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 850.868196] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 850.875435] EXT4-fs (loop7): get root inode failed [ 850.876508] EXT4-fs (loop7): mount failed 11:04:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:04:37 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xffffff7f}, 0x14}}, 0x0) 11:04:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:04:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 864.170589] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 864.173276] EXT4-fs (loop6): get root inode failed [ 864.173718] EXT4-fs (loop6): mount failed [ 864.223816] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 864.225441] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 864.256226] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated [ 864.257826] EXT4-fs (loop7): get root inode failed [ 864.258536] EXT4-fs (loop7): mount failed [ 864.268122] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 864.280121] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 864.322784] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 864.325083] EXT4-fs (loop0): get root inode failed [ 864.325552] EXT4-fs (loop0): mount failed [ 864.350388] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 864.351635] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:04:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:04:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:04:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xffffff9e}, 0x14}}, 0x0) 11:04:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 877.734976] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 877.745861] EXT4-fs (loop0): get root inode failed [ 877.746408] EXT4-fs (loop0): mount failed [ 877.756170] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 877.773264] EXT4-fs (loop6): get root inode failed [ 877.773675] EXT4-fs (loop6): mount failed 11:04:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xfffffff0}, 0x14}}, 0x0) [ 877.829238] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated [ 877.841139] EXT4-fs (loop7): get root inode failed [ 877.841667] EXT4-fs (loop7): mount failed [ 877.848876] EXT4-fs error (device loop2): ext4_orphan_get:1417: comm syz-executor.2: bad orphan inode 301979167 [ 877.849329] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 877.859026] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 877.860973] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 11:04:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:04:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 877.924775] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 877.942352] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:04:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:04:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xfffffffc}, 0x14}}, 0x0) 11:04:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:04:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:04:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 878.057012] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 878.059692] EXT4-fs (loop0): get root inode failed [ 878.060343] EXT4-fs (loop0): mount failed [ 878.128697] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated [ 878.131689] EXT4-fs (loop7): get root inode failed [ 878.132188] EXT4-fs (loop7): mount failed [ 878.195332] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 878.201216] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 878.205328] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 878.206425] EXT4-fs (loop6): get root inode failed [ 878.207347] EXT4-fs (loop6): mount failed [ 878.207802] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 878.213557] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:05:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0xffffffff}, 0x14}}, 0x0) 11:05:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r3 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r3) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:05:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:05:03 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:05:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:05:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 890.634763] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated [ 890.643178] EXT4-fs (loop7): get root inode failed [ 890.644171] EXT4-fs (loop7): mount failed 11:05:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 890.740551] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 890.771618] EXT4-fs (loop0): get root inode failed [ 890.772659] EXT4-fs (loop0): mount failed [ 890.791466] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 890.795637] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 11:05:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 890.825255] EXT4-fs (loop6): get root inode failed [ 890.826253] EXT4-fs (loop6): mount failed [ 890.833241] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:05:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:05:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) [ 890.920565] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 11:05:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 890.960640] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 11:05:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r2 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) [ 890.987326] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 891.006195] EXT4-fs (loop4): get root inode failed [ 891.007268] EXT4-fs (loop4): mount failed [ 891.030745] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated 11:05:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:04 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:04 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) [ 891.076781] EXT4-fs (loop7): get root inode failed [ 891.077799] EXT4-fs (loop7): mount failed 11:05:04 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 891.215657] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 891.238759] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 891.241284] EXT4-fs (loop0): get root inode failed [ 891.242268] EXT4-fs (loop0): mount failed [ 891.258254] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 891.258439] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 891.263580] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 891.264488] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 891.272240] EXT4-fs (loop6): get root inode failed [ 891.273365] EXT4-fs (loop6): mount failed 11:05:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:05:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:05:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 11:05:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:05:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r2 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:05:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000580), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r2, 0x1}, 0x14}}, 0x0) [ 905.101698] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 905.115480] EXT4-fs (loop6): get root inode failed [ 905.116539] EXT4-fs (loop6): mount failed [ 905.133354] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 905.135347] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 905.139085] EXT4-fs error (device loop5): ext4_orphan_get:1417: comm syz-executor.5: bad orphan inode 301979167 [ 905.152556] EXT4-fs error (device loop1): ext4_orphan_get:1417: comm syz-executor.1: bad orphan inode 301979167 [ 905.160715] EXT4-fs error (device loop7): ext4_fill_super:4962: inode #2: comm syz-executor.7: iget: special inode unallocated [ 905.165177] EXT4-fs (loop7): get root inode failed [ 905.166053] EXT4-fs (loop7): mount failed 11:05:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) [ 905.173846] EXT4-fs (loop4): get root inode failed [ 905.174729] EXT4-fs (loop4): mount failed [ 905.175650] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 905.177758] EXT4-fs (loop0): get root inode failed [ 905.178828] EXT4-fs (loop0): mount failed [ 905.183257] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 11:05:18 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) 11:05:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r5 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r5) r6 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r6, 0x7) kcmp(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 11:05:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r2 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, 0xffffffffffffffff, 0x7) 11:05:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r3, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x0, 0x3) r4 = openat$incfs(r0, &(0x7f00000002c0)='.log\x00', 0x40000, 0x100) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) 11:05:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd66", 0x2f, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000180)=0x8, 0x4) connect$inet6(r2, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x3) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8800000) lseek(0xffffffffffffffff, 0x0, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x4, 0x0, 0x1000, 0x0, 0xfff, 0x0, 0x3}, 0x0, 0x0, r4, 0x2) accept4$inet6(r2, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x1, 0x4, 0x4, 0x4, 0x0, 0x6, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc8b, 0x1, @perf_config_ext={0xfffffffffffff741, 0x7f}, 0x40401, 0x1, 0x4, 0x9, 0x1000, 0x2, 0x3ff, 0x0, 0x79, 0x0, 0x6}, r1, 0x5, r5, 0x7) [ 905.822307] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 908.908909] Failed to initialize the IGMP autojoin socket (err -2) [ 909.703425] Failed to initialize the IGMP autojoin socket (err -2) [ 909.719487] Failed to initialize the IGMP autojoin socket (err -2) [ 909.920208] Failed to initialize the IGMP autojoin socket (err -2) [ 909.925592] Failed to initialize the IGMP autojoin socket (err -2) [ 909.931335] Failed to initialize the IGMP autojoin socket (err -2) [ 909.995145] Failed to initialize the IGMP autojoin socket (err -2) [ 910.024504] Failed to initialize the IGMP autojoin socket (err -2) [ 910.785956] Bluetooth: hci0: command 0x0409 tx timeout [ 912.744148] Failed to initialize the IGMP autojoin socket (err -2) [ 912.834553] Bluetooth: hci0: command 0x041b tx timeout [ 913.265590] Failed to initialize the IGMP autojoin socket (err -2) [ 913.396880] Failed to initialize the IGMP autojoin socket (err -2) [ 913.398882] Failed to initialize the IGMP autojoin socket (err -2) [ 913.416412] Failed to initialize the IGMP autojoin socket (err -2) [ 913.460287] Failed to initialize the IGMP autojoin socket (err -2) [ 913.589864] Failed to initialize the IGMP autojoin socket (err -2) [ 914.882052] Bluetooth: hci0: command 0x040f tx timeout [ 916.061570] Failed to initialize the IGMP autojoin socket (err -2) [ 916.756592] Failed to initialize the IGMP autojoin socket (err -2) [ 916.879096] Failed to initialize the IGMP autojoin socket (err -2) [ 916.966704] Failed to initialize the IGMP autojoin socket (err -2) [ 916.992563] Failed to initialize the IGMP autojoin socket (err -2) [ 916.993888] Failed to initialize the IGMP autojoin socket (err -2) [ 917.012504] Failed to initialize the IGMP autojoin socket (err -2) [ 917.953965] Bluetooth: hci0: command 0x0409 tx timeout [ 918.239746] Failed to initialize the IGMP autojoin socket (err -2) [ 919.787233] Failed to initialize the IGMP autojoin socket (err -2) [ 920.002222] Bluetooth: hci0: command 0x041b tx timeout [ 920.479182] Failed to initialize the IGMP autojoin socket (err -2) [ 920.484869] Failed to initialize the IGMP autojoin socket (err -2) [ 920.540873] Failed to initialize the IGMP autojoin socket (err -2) [ 920.554498] Failed to initialize the IGMP autojoin socket (err -2) [ 920.555698] Failed to initialize the IGMP autojoin socket (err -2) [ 920.854472] Failed to initialize the IGMP autojoin socket (err -2) [ 922.645792] Failed to initialize the IGMP autojoin socket (err -2) [ 923.302793] Failed to initialize the IGMP autojoin socket (err -2) [ 923.870139] Failed to initialize the IGMP autojoin socket (err -2) [ 923.882863] Failed to initialize the IGMP autojoin socket (err -2) [ 923.891883] Failed to initialize the IGMP autojoin socket (err -2) [ 923.907205] Failed to initialize the IGMP autojoin socket (err -2) [ 923.949006] Failed to initialize the IGMP autojoin socket (err -2) [ 924.545964] Bluetooth: hci0: command 0x0409 tx timeout [ 924.885213] Failed to initialize the IGMP autojoin socket (err -2) [ 926.445383] Failed to initialize the IGMP autojoin socket (err -2) [ 926.594950] Bluetooth: hci0: command 0x041b tx timeout [ 927.063989] Failed to initialize the IGMP autojoin socket (err -2) [ 927.080426] Failed to initialize the IGMP autojoin socket (err -2) [ 927.102347] Failed to initialize the IGMP autojoin socket (err -2) [ 927.103212] Failed to initialize the IGMP autojoin socket (err -2) [ 927.135478] Failed to initialize the IGMP autojoin socket (err -2) [ 927.510882] Failed to initialize the IGMP autojoin socket (err -2) [ 929.254537] Failed to initialize the IGMP autojoin socket (err -2) [ 929.794053] Failed to initialize the IGMP autojoin socket (err -2) [ 930.244113] Failed to initialize the IGMP autojoin socket (err -2) [ 930.289935] Failed to initialize the IGMP autojoin socket (err -2) [ 930.304424] Failed to initialize the IGMP autojoin socket (err -2) [ 930.313818] Failed to initialize the IGMP autojoin socket (err -2) [ 930.329245] Failed to initialize the IGMP autojoin socket (err -2) [ 930.857105] Failed to initialize the IGMP autojoin socket (err -2) [ 931.138949] Bluetooth: hci0: command 0x0409 tx timeout [ 932.901571] Failed to initialize the IGMP autojoin socket (err -2) [ 933.186009] Bluetooth: hci0: command 0x041b tx timeout [ 933.524230] Failed to initialize the IGMP autojoin socket (err -2) [ 933.541787] Failed to initialize the IGMP autojoin socket (err -2) [ 933.565867] Failed to initialize the IGMP autojoin socket (err -2) [ 933.657579] Failed to initialize the IGMP autojoin socket (err -2) [ 933.680385] Failed to initialize the IGMP autojoin socket (err -2) [ 933.701032] Failed to initialize the IGMP autojoin socket (err -2) [ 935.558341] Failed to initialize the IGMP autojoin socket (err -2) [ 936.276488] Failed to initialize the IGMP autojoin socket (err -2) [ 936.922406] Failed to initialize the IGMP autojoin socket (err -2) [ 936.935642] Failed to initialize the IGMP autojoin socket (err -2) [ 936.984736] Failed to initialize the IGMP autojoin socket (err -2) [ 937.016460] Failed to initialize the IGMP autojoin socket (err -2) [ 937.034440] Failed to initialize the IGMP autojoin socket (err -2) [ 937.298383] Failed to initialize the IGMP autojoin socket (err -2) [ 937.473979] Bluetooth: hci0: command 0x0409 tx timeout [ 939.100435] Failed to initialize the IGMP autojoin socket (err -2) [ 939.521975] Bluetooth: hci0: command 0x041b tx timeout [ 939.677348] Failed to initialize the IGMP autojoin socket (err -2) [ 940.183315] Failed to initialize the IGMP autojoin socket (err -2) [ 940.256701] Failed to initialize the IGMP autojoin socket (err -2) [ 940.294603] Failed to initialize the IGMP autojoin socket (err -2) [ 940.308336] Failed to initialize the IGMP autojoin socket (err -2) [ 940.347156] Failed to initialize the IGMP autojoin socket (err -2) [ 941.814964] Failed to initialize the IGMP autojoin socket (err -2) [ 942.636343] Failed to initialize the IGMP autojoin socket (err -2) [ 943.054240] Failed to initialize the IGMP autojoin socket (err -2) [ 943.421991] Failed to initialize the IGMP autojoin socket (err -2) [ 943.506562] Failed to initialize the IGMP autojoin socket (err -2) [ 943.593997] Failed to initialize the IGMP autojoin socket (err -2) 2024/04/01 11:05:57 executor 2 failed 11 times: executor 2: failed to write control pipe: write |1: broken pipe [ 943.676799] Failed to initialize the IGMP autojoin socket (err -2) [ 943.681990] Bluetooth: hci0: command 0x0409 tx timeout [ 943.754837] Failed to initialize the IGMP autojoin socket (err -2) VM DIAGNOSIS: 11:05:57 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=ffffffffffffffff RCX=ffff8880088c77c0 RDX=1ffff11001117127 RSI=0000000000000000 RDI=ffff8880088b8938 RBP=1ffff11001118ef0 RSP=ffff8880088c7770 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000000 R13=0000000000000001 R14=ffff8880088b8940 R15=ffff8880088b8000 RIP=ffffffff81273f37 RFL=00000057 [---ZAPC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fa74297b900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f01c9ff2008 CR3=0000000008c64000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000ff000000ff00 XMM02=73732f6563696c732e6d65747379732f XMM03=00656369767265732e6873732f656369 XMM04=00005597ec7bbdd000005597ec8799c0 XMM05=00000009ffffffff00005597ec882eb0 XMM06=697665640031006563697665642e3469 XMM07=00000000000000000000000000000000 XMM08=7368746150796c6e4f64616552646e69 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000000 RBX=ffff8880089b0080 RCX=ffffffff8120c703 RDX=0000000000000000 RSI=000000000003c1d7 RDI=ffff8880089b0000 RBP=0000000000000001 RSP=ffff88806cf09c78 R8 =0000000000000000 R9 =ffffffff85673a4f R10=fffffbfff0ace749 R11=0000000000000001 R12=000000000003c1d7 R13=ffff8880089b00d0 R14=ffff8880089b0000 R15=dffffc0000000000 RIP=ffffffff812540da RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9eea3bf348 CR3=0000000038e98000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=2037353a35303a313120312020727041 XMM01=657463656e6e6f63736944203a5d3834 XMM02=302e303120746f6f722072657375206d XMM03=203a5d3834325b646873732072656c6c XMM04=72612078656c70756420646e61206465 XMM05=20726f207465736e75207369206e6f69 XMM06=6f74687465203a5d343034385b647665 XMM07=6b7a79732035353a35303a3131203120 XMM08=223d6d6d6f6320333633343d64697020 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000