fffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:49:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 55) 07:49:44 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:49:44 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r1, 0x2) dup2(0xffffffffffffffff, r0) 07:49:44 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:49:44 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1160.552658] FAULT_INJECTION: forcing a failure. [ 1160.552658] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.554376] CPU: 0 PID: 16104 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1160.555972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1160.558452] Call Trace: [ 1160.559249] dump_stack+0x107/0x167 [ 1160.560350] should_fail.cold+0x5/0xa [ 1160.561620] ? __d_alloc+0x2a/0x990 [ 1160.562741] should_failslab+0x5/0x20 [ 1160.563869] kmem_cache_alloc+0x5b/0x310 [ 1160.565138] ? __d_lookup+0x3bf/0x760 [ 1160.566235] __d_alloc+0x2a/0x990 [ 1160.567185] d_alloc+0x46/0x1c0 [ 1160.568068] __lookup_hash+0xcc/0x190 [ 1160.569139] filename_create+0x186/0x4a0 [ 1160.570230] ? filename_parentat+0x570/0x570 [ 1160.571423] ? getname_flags.part.0+0x1dd/0x4f0 [ 1160.572610] do_mkdirat+0xa2/0x2b0 [ 1160.573664] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1160.575099] ? user_path_create+0xf0/0xf0 [ 1160.576214] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1160.577739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1160.579079] do_syscall_64+0x33/0x40 [ 1160.580089] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1160.581611] RIP: 0033:0x7fc6f5aa4c27 [ 1160.582642] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1160.588097] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1160.589626] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1160.590561] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1160.591498] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1160.592428] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1160.593423] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:49:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 56) [ 1160.626275] FAULT_INJECTION: forcing a failure. [ 1160.626275] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.627815] CPU: 1 PID: 16105 Comm: syz-executor.3 Not tainted 5.10.228 #1 [ 1160.628714] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1160.629801] Call Trace: [ 1160.630151] dump_stack+0x107/0x167 [ 1160.630640] should_fail.cold+0x5/0xa [ 1160.631139] ? create_object.isra.0+0x3a/0xa20 [ 1160.631753] should_failslab+0x5/0x20 [ 1160.632250] kmem_cache_alloc+0x5b/0x310 [ 1160.632773] create_object.isra.0+0x3a/0xa20 [ 1160.633363] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1160.634030] kmem_cache_alloc+0x159/0x310 [ 1160.634555] prepare_creds+0x25/0x5e0 [ 1160.635018] prepare_exec_creds+0xd/0x260 [ 1160.635524] bprm_execve+0x118/0x1960 [ 1160.635992] ? count.constprop.0+0x1b3/0x290 [ 1160.636529] ? open_exec+0x70/0x70 [ 1160.636963] ? copy_string_kernel+0x3b6/0x450 [ 1160.637547] do_execveat_common+0x772/0x8d0 [ 1160.638075] ? bprm_execve+0x1960/0x1960 [ 1160.638584] __x64_sys_execveat+0xed/0x140 [ 1160.639102] do_syscall_64+0x33/0x40 [ 1160.639558] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1160.640178] RIP: 0033:0x7f89c1b7db19 [ 1160.640632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1160.642876] RSP: 002b:00007f89bf0f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1160.643802] RAX: ffffffffffffffda RBX: 00007f89c1c90f60 RCX: 00007f89c1b7db19 [ 1160.644668] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1160.645551] RBP: 00007f89bf0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1160.646413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1160.647278] R13: 00007fff8fa0baff R14: 00007f89bf0f3300 R15: 0000000000022000 07:49:45 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:49:45 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:49:45 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1160.760250] FAULT_INJECTION: forcing a failure. [ 1160.760250] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.766542] CPU: 1 PID: 16255 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1160.767439] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1160.768510] Call Trace: 07:49:45 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) [ 1160.768862] dump_stack+0x107/0x167 [ 1160.773143] should_fail.cold+0x5/0xa [ 1160.773655] ? create_object.isra.0+0x3a/0xa20 [ 1160.781257] should_failslab+0x5/0x20 [ 1160.781760] kmem_cache_alloc+0x5b/0x310 [ 1160.782303] create_object.isra.0+0x3a/0xa20 [ 1160.782878] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1160.783551] kmem_cache_alloc+0x159/0x310 [ 1160.784103] ? ext4_init_journal_params+0x350/0x350 [ 1160.784760] ext4_alloc_inode+0x1a/0x670 [ 1160.789284] ? ext4_init_journal_params+0x350/0x350 [ 1160.789934] alloc_inode+0x63/0x240 [ 1160.790412] new_inode+0x23/0x250 [ 1160.790875] __ext4_new_inode+0x32c/0x5370 07:49:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 28) [ 1160.791430] ? avc_has_extended_perms+0xf40/0xf40 [ 1160.797686] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1160.798401] ? dquot_initialize_needed+0x290/0x290 [ 1160.799057] ? selinux_determine_inode_label+0x1ab/0x340 [ 1160.799778] ext4_mkdir+0x32c/0xb10 [ 1160.805311] ? ext4_rmdir+0xf70/0xf70 [ 1160.805822] vfs_mkdir+0x493/0x750 [ 1160.806299] do_mkdirat+0x150/0x2b0 [ 1160.806778] ? user_path_create+0xf0/0xf0 [ 1160.807331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1160.808013] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1160.808684] do_syscall_64+0x33/0x40 [ 1160.817368] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1160.821123] RIP: 0033:0x7fc6f5aa4c27 [ 1160.821610] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1160.823972] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1160.824961] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1160.825893] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1160.826812] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1160.827731] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1160.833739] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1160.872394] EXT4-fs (loop6): Can't read superblock on 2nd try 07:49:45 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r1, 0x2) dup2(0xffffffffffffffff, r0) 07:49:45 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:49:45 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1161.034744] FAULT_INJECTION: forcing a failure. [ 1161.034744] name failslab, interval 1, probability 0, space 0, times 0 [ 1161.049264] CPU: 1 PID: 16367 Comm: syz-executor.3 Not tainted 5.10.228 #1 [ 1161.050198] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1161.051269] Call Trace: [ 1161.051622] dump_stack+0x107/0x167 [ 1161.052106] should_fail.cold+0x5/0xa [ 1161.052612] ? create_object.isra.0+0x3a/0xa20 [ 1161.057098] should_failslab+0x5/0x20 [ 1161.057603] kmem_cache_alloc+0x5b/0x310 [ 1161.058143] create_object.isra.0+0x3a/0xa20 [ 1161.058717] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1161.059385] kmem_cache_alloc+0x159/0x310 [ 1161.059936] __alloc_file+0x21/0x320 [ 1161.060423] alloc_empty_file+0x6d/0x170 [ 1161.060952] path_openat+0xe6/0x2770 [ 1161.061462] ? lock_chain_count+0x20/0x20 [ 1161.062013] ? stack_trace_consume_entry+0x160/0x160 [ 1161.062682] ? path_lookupat+0x860/0x860 [ 1161.073561] ? kasan_save_stack+0x32/0x40 [ 1161.074128] ? kasan_save_stack+0x1b/0x40 [ 1161.074693] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1161.075352] ? security_prepare_creds+0x112/0x190 [ 1161.075982] ? prepare_creds+0x452/0x5e0 [ 1161.076552] ? prepare_exec_creds+0xd/0x260 [ 1161.081351] do_filp_open+0x190/0x3e0 [ 1161.081852] ? may_open_dev+0xf0/0xf0 [ 1161.082394] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1161.083091] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1161.083837] ? find_held_lock+0x2c/0x110 [ 1161.093605] do_open_execat+0x116/0x750 [ 1161.094126] ? bprm_execve+0x49d/0x1960 [ 1161.094663] ? __do_sys_uselib+0x680/0x680 [ 1161.095243] ? do_raw_spin_lock+0x121/0x260 [ 1161.101229] ? rwlock_bug.part.0+0x90/0x90 [ 1161.101813] bprm_execve+0x4dc/0x1960 [ 1161.113229] ? count.constprop.0+0x1b3/0x290 [ 1161.113772] ? open_exec+0x70/0x70 [ 1161.114204] ? copy_string_kernel+0x3b6/0x450 [ 1161.114755] do_execveat_common+0x772/0x8d0 [ 1161.115281] ? bprm_execve+0x1960/0x1960 [ 1161.115790] __x64_sys_execveat+0xed/0x140 [ 1161.116307] do_syscall_64+0x33/0x40 [ 1161.125274] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1161.125896] RIP: 0033:0x7f89c1b7db19 [ 1161.126350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.128576] RSP: 002b:00007f89bf0f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1161.133311] RAX: ffffffffffffffda RBX: 00007f89c1c90f60 RCX: 00007f89c1b7db19 [ 1161.134176] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1161.135037] RBP: 00007f89bf0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.135900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1161.136760] R13: 00007fff8fa0baff R14: 00007f89bf0f3300 R15: 0000000000022000 07:49:59 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:49:59 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r1, 0x2) dup2(r0, 0xffffffffffffffff) 07:49:59 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:49:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 57) 07:49:59 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:49:59 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:49:59 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:49:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 29) [ 1175.695848] FAULT_INJECTION: forcing a failure. [ 1175.695848] name failslab, interval 1, probability 0, space 0, times 0 [ 1175.697295] CPU: 0 PID: 16552 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1175.699009] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1175.700029] Call Trace: [ 1175.700358] dump_stack+0x107/0x167 [ 1175.700807] should_fail.cold+0x5/0xa [ 1175.701279] ? ext4_alloc_inode+0x1a/0x670 [ 1175.706163] should_failslab+0x5/0x20 [ 1175.706635] kmem_cache_alloc+0x5b/0x310 [ 1175.707132] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1175.707876] ? ext4_init_journal_params+0x350/0x350 [ 1175.708486] ext4_alloc_inode+0x1a/0x670 [ 1175.708986] ? ext4_init_journal_params+0x350/0x350 [ 1175.709605] alloc_inode+0x63/0x240 [ 1175.710059] new_inode+0x23/0x250 [ 1175.710486] __ext4_new_inode+0x32c/0x5370 [ 1175.711002] ? avc_has_extended_perms+0xf40/0xf40 [ 1175.711608] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1175.712199] ? dquot_initialize_needed+0x290/0x290 [ 1175.712793] ? selinux_determine_inode_label+0x1ab/0x340 [ 1175.713458] ext4_mkdir+0x32c/0xb10 [ 1175.713928] ? ext4_rmdir+0xf70/0xf70 [ 1175.714404] vfs_mkdir+0x493/0x750 [ 1175.714838] do_mkdirat+0x150/0x2b0 [ 1175.715283] ? user_path_create+0xf0/0xf0 [ 1175.715797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1175.716437] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1175.717065] do_syscall_64+0x33/0x40 [ 1175.717520] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1175.718159] RIP: 0033:0x7fc6f5aa4c27 [ 1175.718618] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1175.720853] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1175.721793] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1175.722664] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1175.723530] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1175.724398] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1175.725267] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:50:00 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1175.746952] FAULT_INJECTION: forcing a failure. [ 1175.746952] name failslab, interval 1, probability 0, space 0, times 0 [ 1175.748340] CPU: 0 PID: 16576 Comm: syz-executor.3 Not tainted 5.10.228 #1 [ 1175.749188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1175.750216] Call Trace: [ 1175.750541] dump_stack+0x107/0x167 [ 1175.750994] should_fail.cold+0x5/0xa [ 1175.751464] ? security_file_alloc+0x34/0x170 [ 1175.752015] should_failslab+0x5/0x20 [ 1175.752482] kmem_cache_alloc+0x5b/0x310 [ 1175.752984] security_file_alloc+0x34/0x170 [ 1175.753515] __alloc_file+0xb7/0x320 [ 1175.753996] alloc_empty_file+0x6d/0x170 [ 1175.754496] path_openat+0xe6/0x2770 [ 1175.754958] ? lock_chain_count+0x20/0x20 [ 1175.755471] ? stack_trace_consume_entry+0x160/0x160 [ 1175.756089] ? path_lookupat+0x860/0x860 [ 1175.756597] ? kasan_save_stack+0x32/0x40 [ 1175.757102] ? kasan_save_stack+0x1b/0x40 [ 1175.757684] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1175.758304] ? security_prepare_creds+0x112/0x190 [ 1175.758893] ? prepare_creds+0x452/0x5e0 [ 1175.759386] ? prepare_exec_creds+0xd/0x260 [ 1175.759919] do_filp_open+0x190/0x3e0 [ 1175.760382] ? may_open_dev+0xf0/0xf0 [ 1175.760863] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1175.761506] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1175.763060] ? find_held_lock+0x2c/0x110 [ 1175.764227] do_open_execat+0x116/0x750 [ 1175.765360] ? bprm_execve+0x49d/0x1960 [ 1175.766512] ? __do_sys_uselib+0x680/0x680 [ 1175.767732] ? do_raw_spin_lock+0x121/0x260 [ 1175.768961] ? rwlock_bug.part.0+0x90/0x90 [ 1175.770189] bprm_execve+0x4dc/0x1960 [ 1175.771282] ? count.constprop.0+0x1b3/0x290 [ 1175.772544] ? open_exec+0x70/0x70 [ 1175.773565] ? copy_string_kernel+0x3b6/0x450 [ 1175.774861] do_execveat_common+0x772/0x8d0 [ 1175.776097] ? bprm_execve+0x1960/0x1960 [ 1175.777271] __x64_sys_execveat+0xed/0x140 [ 1175.778496] do_syscall_64+0x33/0x40 [ 1175.779558] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1175.781040] RIP: 0033:0x7f89c1b7db19 [ 1175.782107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1175.787448] RSP: 002b:00007f89bf0d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1175.789630] RAX: ffffffffffffffda RBX: 00007f89c1c91020 RCX: 00007f89c1b7db19 [ 1175.791688] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1175.793737] RBP: 00007f89bf0d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1175.795782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1175.797834] R13: 00007fff8fa0baff R14: 00007f89bf0d2300 R15: 0000000000022000 07:50:00 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 58) [ 1176.506290] FAULT_INJECTION: forcing a failure. [ 1176.506290] name failslab, interval 1, probability 0, space 0, times 0 [ 1176.507867] CPU: 0 PID: 16765 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1176.508766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1176.509867] Call Trace: [ 1176.510217] dump_stack+0x107/0x167 [ 1176.510707] should_fail.cold+0x5/0xa [ 1176.511212] ? create_object.isra.0+0x3a/0xa20 [ 1176.511821] should_failslab+0x5/0x20 [ 1176.512319] kmem_cache_alloc+0x5b/0x310 [ 1176.512858] create_object.isra.0+0x3a/0xa20 [ 1176.513438] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1176.514129] kmem_cache_alloc+0x159/0x310 [ 1176.514678] ? ext4_init_journal_params+0x350/0x350 [ 1176.515344] ext4_alloc_inode+0x1a/0x670 [ 1176.515878] ? ext4_init_journal_params+0x350/0x350 [ 1176.516541] alloc_inode+0x63/0x240 [ 1176.517017] new_inode+0x23/0x250 [ 1176.517491] __ext4_new_inode+0x32c/0x5370 [ 1176.518071] ? avc_has_extended_perms+0xf40/0xf40 [ 1176.518732] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1176.519385] ? dquot_initialize_needed+0x290/0x290 [ 1176.520031] ? selinux_determine_inode_label+0x1ab/0x340 [ 1176.520768] ext4_mkdir+0x32c/0xb10 [ 1176.521257] ? ext4_rmdir+0xf70/0xf70 [ 1176.521800] vfs_mkdir+0x493/0x750 [ 1176.522272] do_mkdirat+0x150/0x2b0 [ 1176.522765] ? user_path_create+0xf0/0xf0 [ 1176.523318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1176.524028] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1176.524713] do_syscall_64+0x33/0x40 [ 1176.525219] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1176.525892] RIP: 0033:0x7fc6f5aa4c27 [ 1176.526345] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1176.528579] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1176.529504] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1176.530460] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1176.531348] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1176.532288] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1176.533214] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1176.598520] EXT4-fs (loop6): Can't read superblock on 2nd try 07:50:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 30) 07:50:14 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 59) 07:50:14 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7", 0x4}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:50:14 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:50:14 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:50:14 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r1, 0x2) dup2(r0, 0xffffffffffffffff) 07:50:14 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:50:14 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) [ 1190.791752] FAULT_INJECTION: forcing a failure. [ 1190.791752] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.794356] CPU: 1 PID: 16781 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1190.795327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1190.796529] Call Trace: [ 1190.796927] dump_stack+0x107/0x167 [ 1190.797446] should_fail.cold+0x5/0xa [ 1190.797991] ? ext4_alloc_inode+0x1a/0x670 [ 1190.802624] should_failslab+0x5/0x20 [ 1190.803165] kmem_cache_alloc+0x5b/0x310 [ 1190.803738] ? security_compute_validatetrans.part.0+0x960/0x960 [ 1190.804586] ? ext4_init_journal_params+0x350/0x350 [ 1190.805283] ext4_alloc_inode+0x1a/0x670 [ 1190.805855] ? ext4_init_journal_params+0x350/0x350 [ 1190.806567] alloc_inode+0x63/0x240 [ 1190.807078] new_inode+0x23/0x250 [ 1190.807572] __ext4_new_inode+0x32c/0x5370 [ 1190.808165] ? avc_has_extended_perms+0xf40/0xf40 [ 1190.808853] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1190.809534] ? dquot_initialize_needed+0x290/0x290 [ 1190.810230] ? selinux_determine_inode_label+0x1ab/0x340 [ 1190.810993] ext4_mkdir+0x32c/0xb10 [ 1190.811512] ? ext4_rmdir+0xf70/0xf70 [ 1190.812059] vfs_mkdir+0x493/0x750 [ 1190.812566] do_mkdirat+0x150/0x2b0 [ 1190.813082] ? user_path_create+0xf0/0xf0 [ 1190.813670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1190.814410] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1190.815130] do_syscall_64+0x33/0x40 [ 1190.815585] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1190.816207] RIP: 0033:0x7fc6f5aa4c27 [ 1190.816660] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1190.818894] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1190.819818] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1190.820681] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1190.821547] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1190.822420] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1190.823286] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:50:15 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7", 0x4}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1190.837604] FAULT_INJECTION: forcing a failure. [ 1190.837604] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.843079] CPU: 0 PID: 16791 Comm: syz-executor.3 Not tainted 5.10.228 #1 [ 1190.843919] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1190.844925] Call Trace: [ 1190.845247] dump_stack+0x107/0x167 [ 1190.845691] should_fail.cold+0x5/0xa [ 1190.846165] ? create_object.isra.0+0x3a/0xa20 [ 1190.846727] should_failslab+0x5/0x20 [ 1190.847191] kmem_cache_alloc+0x5b/0x310 [ 1190.847689] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1190.848358] create_object.isra.0+0x3a/0xa20 [ 1190.848889] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1190.849509] kmem_cache_alloc+0x159/0x310 [ 1190.850018] security_file_alloc+0x34/0x170 [ 1190.850561] __alloc_file+0xb7/0x320 [ 1190.851014] alloc_empty_file+0x6d/0x170 [ 1190.851509] path_openat+0xe6/0x2770 [ 1190.851967] ? lock_chain_count+0x20/0x20 [ 1190.852475] ? stack_trace_consume_entry+0x160/0x160 [ 1190.853091] ? path_lookupat+0x860/0x860 [ 1190.853595] ? kasan_save_stack+0x32/0x40 [ 1190.854108] ? kasan_save_stack+0x1b/0x40 [ 1190.854614] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1190.855227] ? security_prepare_creds+0x112/0x190 [ 1190.855812] ? prepare_creds+0x452/0x5e0 [ 1190.856303] ? prepare_exec_creds+0xd/0x260 [ 1190.856831] do_filp_open+0x190/0x3e0 [ 1190.857292] ? may_open_dev+0xf0/0xf0 [ 1190.857769] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1190.858423] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1190.859097] ? find_held_lock+0x2c/0x110 [ 1190.859599] do_open_execat+0x116/0x750 [ 1190.860081] ? bprm_execve+0x49d/0x1960 [ 1190.860567] ? __do_sys_uselib+0x680/0x680 [ 1190.861078] ? do_raw_spin_lock+0x121/0x260 [ 1190.861600] ? rwlock_bug.part.0+0x90/0x90 [ 1190.862130] bprm_execve+0x4dc/0x1960 [ 1190.862600] ? count.constprop.0+0x1b3/0x290 [ 1190.863135] ? open_exec+0x70/0x70 [ 1190.863566] ? copy_string_kernel+0x3b6/0x450 [ 1190.864115] do_execveat_common+0x772/0x8d0 [ 1190.864644] ? bprm_execve+0x1960/0x1960 [ 1190.865152] __x64_sys_execveat+0xed/0x140 [ 1190.865675] do_syscall_64+0x33/0x40 [ 1190.866138] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1190.866765] RIP: 0033:0x7f89c1b7db19 [ 1190.867219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1190.869449] RSP: 002b:00007f89bf0d2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1190.870388] RAX: ffffffffffffffda RBX: 00007f89c1c91020 RCX: 00007f89c1b7db19 [ 1190.871255] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1190.872118] RBP: 00007f89bf0d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1190.872980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1190.873848] R13: 00007fff8fa0baff R14: 00007f89bf0d2300 R15: 0000000000022000 07:50:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 60) 07:50:15 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:50:15 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r1, 0x2) dup2(r0, 0xffffffffffffffff) 07:50:15 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:50:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 31) 07:50:15 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:50:15 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) [ 1191.452196] FAULT_INJECTION: forcing a failure. [ 1191.452196] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.453519] CPU: 1 PID: 16999 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1191.454336] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1191.455298] Call Trace: [ 1191.455611] dump_stack+0x107/0x167 [ 1191.456036] should_fail.cold+0x5/0xa [ 1191.456482] ? create_object.isra.0+0x3a/0xa20 [ 1191.457013] should_failslab+0x5/0x20 [ 1191.457456] kmem_cache_alloc+0x5b/0x310 [ 1191.457933] create_object.isra.0+0x3a/0xa20 [ 1191.458458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1191.459050] kmem_cache_alloc+0x159/0x310 [ 1191.459539] security_inode_alloc+0x34/0x160 [ 1191.460056] inode_init_always+0xa4e/0xd10 [ 1191.460551] alloc_inode+0x84/0x240 [ 1191.460972] new_inode+0x23/0x250 [ 1191.461379] __ext4_new_inode+0x32c/0x5370 [ 1191.461870] ? avc_has_extended_perms+0xf40/0xf40 [ 1191.462454] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1191.463020] ? dquot_initialize_needed+0x290/0x290 [ 1191.463592] ? selinux_determine_inode_label+0x1ab/0x340 [ 1191.464232] ext4_mkdir+0x32c/0xb10 [ 1191.464665] ? ext4_rmdir+0xf70/0xf70 [ 1191.465115] vfs_mkdir+0x493/0x750 [ 1191.465532] do_mkdirat+0x150/0x2b0 [ 1191.465956] ? user_path_create+0xf0/0xf0 [ 1191.466457] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1191.467065] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1191.467666] do_syscall_64+0x33/0x40 [ 1191.468099] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1191.468709] RIP: 0033:0x7fc6f5aa4c27 [ 1191.469140] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.471271] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1191.472147] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1191.472970] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1191.473789] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1191.474623] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1191.475445] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1191.528944] EXT4-fs (loop6): Can't read superblock on 2nd try 07:50:15 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7", 0x4}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:50:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 61) 07:50:15 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) [ 1191.851507] FAULT_INJECTION: forcing a failure. [ 1191.851507] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.852822] CPU: 1 PID: 17013 Comm: syz-executor.3 Not tainted 5.10.228 #1 [ 1191.853617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1191.854606] Call Trace: [ 1191.854923] dump_stack+0x107/0x167 [ 1191.855345] should_fail.cold+0x5/0xa [ 1191.855796] should_failslab+0x5/0x20 [ 1191.856238] __kmalloc_track_caller+0x79/0x370 [ 1191.856767] ? bprm_change_interp+0x7c/0xf0 [ 1191.857274] kstrdup+0x36/0x70 [ 1191.857648] bprm_change_interp+0x7c/0xf0 [ 1191.858138] load_script+0x4ab/0x760 [ 1191.858591] bprm_execve+0x84e/0x1960 [ 1191.859037] ? open_exec+0x70/0x70 [ 1191.859450] ? copy_string_kernel+0x3b6/0x450 [ 1191.859977] do_execveat_common+0x772/0x8d0 [ 1191.860478] ? bprm_execve+0x1960/0x1960 [ 1191.860961] __x64_sys_execveat+0xed/0x140 [ 1191.861460] do_syscall_64+0x33/0x40 [ 1191.861892] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1191.862508] RIP: 0033:0x7f89c1b7db19 [ 1191.862939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.865072] RSP: 002b:00007f89bf0f3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1191.865955] RAX: ffffffffffffffda RBX: 00007f89c1c90f60 RCX: 00007f89c1b7db19 [ 1191.866802] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1191.867634] RBP: 00007f89bf0f31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.868461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1191.869285] R13: 00007fff8fa0baff R14: 00007f89bf0f3300 R15: 0000000000022000 [ 1192.112820] FAULT_INJECTION: forcing a failure. [ 1192.112820] name failslab, interval 1, probability 0, space 0, times 0 [ 1192.114239] CPU: 0 PID: 17224 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1192.118946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1192.119952] Call Trace: [ 1192.120278] dump_stack+0x107/0x167 [ 1192.120724] should_fail.cold+0x5/0xa [ 1192.121188] ? jbd2__journal_start+0x190/0x7e0 [ 1192.121766] should_failslab+0x5/0x20 [ 1192.122246] kmem_cache_alloc+0x5b/0x310 [ 1192.122750] jbd2__journal_start+0x190/0x7e0 [ 1192.123296] __ext4_journal_start_sb+0x214/0x390 [ 1192.123877] __ext4_new_inode+0x2e0b/0x5370 [ 1192.124417] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1192.125010] ? dquot_initialize_needed+0x290/0x290 [ 1192.125611] ? selinux_determine_inode_label+0x1ab/0x340 [ 1192.126301] ext4_mkdir+0x32c/0xb10 [ 1192.126753] ? ext4_rmdir+0xf70/0xf70 [ 1192.127224] vfs_mkdir+0x493/0x750 [ 1192.127662] do_mkdirat+0x150/0x2b0 [ 1192.128106] ? user_path_create+0xf0/0xf0 [ 1192.128619] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1192.129256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1192.129887] do_syscall_64+0x33/0x40 [ 1192.130370] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1192.131085] RIP: 0033:0x7fc6f5aa4c27 [ 1192.131606] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1192.134199] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1192.135266] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1192.136270] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1192.137280] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1192.138275] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1192.139280] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1192.140433] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory 07:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) (fail_nth: 32) 07:50:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 62) 07:50:31 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:50:31 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:50:31 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0x0, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:50:31 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:50:31 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:50:31 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0", 0x6}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1206.959153] FAULT_INJECTION: forcing a failure. [ 1206.959153] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.960872] CPU: 1 PID: 17242 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1206.961864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1206.963071] Call Trace: [ 1206.963546] dump_stack+0x107/0x167 [ 1206.964021] should_fail.cold+0x5/0xa [ 1206.964620] ? jbd2__journal_start+0x190/0x7e0 [ 1206.965315] should_failslab+0x5/0x20 [ 1206.965814] kmem_cache_alloc+0x5b/0x310 [ 1206.966472] jbd2__journal_start+0x190/0x7e0 [ 1206.967061] __ext4_journal_start_sb+0x214/0x390 [ 1206.967780] __ext4_new_inode+0x2e0b/0x5370 [ 1206.968481] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1206.969110] ? dquot_initialize_needed+0x290/0x290 [ 1206.969857] ? selinux_determine_inode_label+0x1ab/0x340 [ 1206.970705] ext4_mkdir+0x32c/0xb10 [ 1206.971281] ? ext4_rmdir+0xf70/0xf70 [ 1206.971801] vfs_mkdir+0x493/0x750 [ 1206.972368] do_mkdirat+0x150/0x2b0 [ 1206.972843] ? user_path_create+0xf0/0xf0 [ 1206.973511] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1206.974232] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1206.974991] do_syscall_64+0x33/0x40 [ 1206.975581] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1206.976341] RIP: 0033:0x7fc6f5aa4c27 07:50:31 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0", 0x6}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1206.976822] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.995567] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1206.997612] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1206.998590] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1206.999602] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1207.000570] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1207.001538] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1207.002980] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 1207.012388] FAULT_INJECTION: forcing a failure. [ 1207.012388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1207.016189] CPU: 1 PID: 17249 Comm: syz-executor.3 Not tainted 5.10.228 #1 [ 1207.017954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1207.019398] Call Trace: [ 1207.019720] dump_stack+0x107/0x167 [ 1207.020374] should_fail.cold+0x5/0xa [ 1207.020859] _copy_to_user+0x2e/0x180 [ 1207.021565] simple_read_from_buffer+0xcc/0x160 [ 1207.022149] proc_fail_nth_read+0x198/0x230 [ 1207.022745] ? proc_sessionid_read+0x230/0x230 [ 1207.023522] ? security_file_permission+0xb1/0xe0 [ 1207.024149] ? proc_sessionid_read+0x230/0x230 [ 1207.024793] vfs_read+0x228/0x620 [ 1207.025321] ksys_read+0x12d/0x260 [ 1207.025791] ? vfs_write+0xb10/0xb10 [ 1207.026335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1207.027024] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1207.027751] do_syscall_64+0x33/0x40 [ 1207.028386] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1207.029171] RIP: 0033:0x7f89c1b3069c [ 1207.029810] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1207.032962] RSP: 002b:00007f89bf0d2170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1207.034176] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f89c1b3069c [ 1207.035559] RDX: 000000000000000f RSI: 00007f89bf0d21e0 RDI: 0000000000000003 [ 1207.036701] RBP: 00007f89bf0d21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1207.037912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1207.039127] R13: 00007fff8fa0baff R14: 00007f89bf0d2300 R15: 0000000000022000 07:50:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 07:50:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 63) 07:50:31 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:50:31 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:50:31 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0", 0x6}], 0x1, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:50:31 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1207.234779] FAULT_INJECTION: forcing a failure. [ 1207.234779] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.236565] CPU: 0 PID: 17446 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1207.237415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1207.238437] Call Trace: [ 1207.238786] dump_stack+0x107/0x167 [ 1207.239232] should_fail.cold+0x5/0xa [ 1207.239712] should_failslab+0x5/0x20 [ 1207.240185] __kmalloc_track_caller+0x79/0x370 [ 1207.240749] ? sidtab_sid2str_get+0x17e/0x720 [ 1207.241304] kmemdup+0x23/0x50 [ 1207.241702] sidtab_sid2str_get+0x17e/0x720 [ 1207.242234] sidtab_entry_to_string+0x33/0x110 [ 1207.242820] security_sid_to_context_core+0x33c/0x5d0 [ 1207.243459] selinux_inode_init_security+0x4ab/0x690 [ 1207.244083] ? selinux_dentry_init_security+0x280/0x280 [ 1207.244736] ? get_cached_acl_rcu+0x120/0x120 [ 1207.245292] ? find_held_lock+0x2c/0x110 [ 1207.245800] security_inode_init_security+0x151/0x360 [ 1207.246431] ? ext4_init_acl+0x310/0x310 [ 1207.246959] ? inode_free_by_rcu+0x20/0x20 [ 1207.247486] ? chksum_update+0x4c/0xb0 [ 1207.247977] __ext4_new_inode+0x386e/0x5370 [ 1207.248522] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1207.249112] ? dquot_initialize_needed+0x290/0x290 [ 1207.249710] ? selinux_determine_inode_label+0x1ab/0x340 [ 1207.250377] ext4_mkdir+0x32c/0xb10 [ 1207.250847] ? ext4_rmdir+0xf70/0xf70 [ 1207.251322] vfs_mkdir+0x493/0x750 [ 1207.251761] do_mkdirat+0x150/0x2b0 [ 1207.252205] ? user_path_create+0xf0/0xf0 [ 1207.252718] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1207.253358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1207.253989] do_syscall_64+0x33/0x40 [ 1207.254444] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1207.255081] RIP: 0033:0x7fc6f5aa4c27 [ 1207.255539] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1207.257783] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1207.258723] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1207.259601] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1207.260473] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1207.261341] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1207.262210] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:50:31 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0x0, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:50:31 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:50:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 64) 07:50:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2) 07:50:46 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:50:46 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:50:46 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:50:46 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:50:46 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0x0, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:50:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) [ 1222.161806] FAULT_INJECTION: forcing a failure. [ 1222.161806] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.163548] CPU: 1 PID: 17688 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1222.164584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1222.165758] Call Trace: [ 1222.166100] dump_stack+0x107/0x167 [ 1222.166697] should_fail.cold+0x5/0xa [ 1222.167195] ? create_object.isra.0+0x3a/0xa20 [ 1222.167930] should_failslab+0x5/0x20 [ 1222.168753] kmem_cache_alloc+0x5b/0x310 [ 1222.170049] ? sidtab_sid2str_get+0x65/0x720 [ 1222.171501] create_object.isra.0+0x3a/0xa20 [ 1222.172842] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1222.174496] __kmalloc_track_caller+0x177/0x370 [ 1222.175960] ? sidtab_sid2str_get+0x17e/0x720 [ 1222.177450] kmemdup+0x23/0x50 [ 1222.178481] sidtab_sid2str_get+0x17e/0x720 [ 1222.179885] sidtab_entry_to_string+0x33/0x110 [ 1222.181347] security_sid_to_context_core+0x33c/0x5d0 [ 1222.182937] selinux_inode_init_security+0x4ab/0x690 [ 1222.184586] ? selinux_dentry_init_security+0x280/0x280 [ 1222.186226] ? get_cached_acl_rcu+0x120/0x120 [ 1222.187708] ? find_held_lock+0x2c/0x110 [ 1222.188983] security_inode_init_security+0x151/0x360 [ 1222.190633] ? ext4_init_acl+0x310/0x310 [ 1222.191951] ? inode_free_by_rcu+0x20/0x20 [ 1222.193354] ? chksum_update+0x4c/0xb0 [ 1222.194578] __ext4_new_inode+0x386e/0x5370 [ 1222.195977] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1222.197524] ? dquot_initialize_needed+0x290/0x290 [ 1222.199007] ? selinux_determine_inode_label+0x1ab/0x340 [ 1222.200498] ext4_mkdir+0x32c/0xb10 [ 1222.201468] ? ext4_rmdir+0xf70/0xf70 [ 1222.202539] vfs_mkdir+0x493/0x750 [ 1222.203554] do_mkdirat+0x150/0x2b0 [ 1222.204764] ? user_path_create+0xf0/0xf0 [ 1222.206079] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1222.207854] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1222.209527] do_syscall_64+0x33/0x40 [ 1222.210717] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1222.212397] RIP: 0033:0x7fc6f5aa4c27 [ 1222.213606] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1222.219666] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1222.222019] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1222.224307] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1222.226527] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1222.228784] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1222.230886] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1222.273884] EXT4-fs (loop6): Can't read superblock on 2nd try 07:50:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 65) 07:50:46 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:50:46 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:50:46 executing program 2: add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:50:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3) 07:50:46 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:50:46 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:50:46 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:50:47 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1223.123892] FAULT_INJECTION: forcing a failure. [ 1223.123892] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.125520] CPU: 1 PID: 17915 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1223.126449] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1223.131577] Call Trace: [ 1223.131940] dump_stack+0x107/0x167 [ 1223.132426] should_fail.cold+0x5/0xa [ 1223.132955] should_failslab+0x5/0x20 [ 1223.133461] __kmalloc_track_caller+0x79/0x370 [ 1223.134066] ? sidtab_sid2str_get+0x17e/0x720 [ 1223.134672] kmemdup+0x23/0x50 [ 1223.135106] sidtab_sid2str_get+0x17e/0x720 [ 1223.135684] sidtab_entry_to_string+0x33/0x110 [ 1223.136282] security_sid_to_context_core+0x33c/0x5d0 [ 1223.139664] selinux_inode_init_security+0x4ab/0x690 [ 1223.140352] ? selinux_dentry_init_security+0x280/0x280 [ 1223.141075] ? get_cached_acl_rcu+0x120/0x120 [ 1223.141678] ? find_held_lock+0x2c/0x110 [ 1223.142236] security_inode_init_security+0x151/0x360 [ 1223.142922] ? ext4_init_acl+0x310/0x310 [ 1223.144225] ? inode_free_by_rcu+0x20/0x20 [ 1223.144814] ? chksum_update+0x4c/0xb0 [ 1223.145342] __ext4_new_inode+0x386e/0x5370 [ 1223.145941] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1223.146592] ? dquot_initialize_needed+0x290/0x290 [ 1223.155264] ? selinux_determine_inode_label+0x1ab/0x340 [ 1223.155980] ext4_mkdir+0x32c/0xb10 [ 1223.156455] ? ext4_rmdir+0xf70/0xf70 [ 1223.156947] vfs_mkdir+0x493/0x750 [ 1223.157397] do_mkdirat+0x150/0x2b0 [ 1223.157859] ? user_path_create+0xf0/0xf0 [ 1223.158387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1223.159048] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1223.167744] do_syscall_64+0x33/0x40 [ 1223.168242] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1223.175486] RIP: 0033:0x7fc6f5aa4c27 [ 1223.175940] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.178160] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1223.179080] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1223.180622] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1223.182350] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1223.184304] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1223.186033] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:51:01 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:51:01 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:51:01 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:51:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4) 07:51:01 executing program 2: add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:51:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 66) 07:51:01 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:51:01 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:51:02 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:51:02 executing program 5: r0 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) [ 1237.824151] FAULT_INJECTION: forcing a failure. [ 1237.824151] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.828798] CPU: 0 PID: 18137 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1237.829637] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1237.830638] Call Trace: [ 1237.830964] dump_stack+0x107/0x167 [ 1237.831408] should_fail.cold+0x5/0xa [ 1237.831893] ? create_object.isra.0+0x3a/0xa20 [ 1237.832451] should_failslab+0x5/0x20 [ 1237.832914] kmem_cache_alloc+0x5b/0x310 [ 1237.833411] create_object.isra.0+0x3a/0xa20 [ 1237.833944] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1237.834562] __kmalloc+0x16e/0x390 [ 1237.834999] ext4_find_extent+0xa77/0xd70 [ 1237.835511] ext4_ext_map_blocks+0x1c8/0x5830 [ 1237.836080] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1237.836716] ? find_held_lock+0x2c/0x110 [ 1237.837210] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1237.837847] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1237.838484] ? ext4_ext_release+0x10/0x10 [ 1237.838993] ? lock_release+0x680/0x680 [ 1237.839478] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1237.840069] ? lock_downgrade+0x6d0/0x6d0 [ 1237.840586] ? down_read+0x10f/0x430 [ 1237.841040] ? down_write+0x160/0x160 [ 1237.841502] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1237.842074] ext4_map_blocks+0x8e1/0x1910 [ 1237.842583] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1237.843127] ? __brelse+0x84/0xa0 [ 1237.843548] ? __ext4_new_inode+0x148/0x5370 [ 1237.856537] ext4_append+0x1b8/0x4e0 [ 1237.856994] ? ext4_move_extents+0x3050/0x3050 [ 1237.857550] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1237.858142] ext4_init_new_dir+0x25e/0x4d0 [ 1237.858657] ? ext4_init_dot_dotdot+0x610/0x610 [ 1237.859227] ext4_mkdir+0x3c1/0xb10 [ 1237.859671] ? ext4_rmdir+0xf70/0xf70 [ 1237.860155] vfs_mkdir+0x493/0x750 [ 1237.860588] do_mkdirat+0x150/0x2b0 [ 1237.861030] ? user_path_create+0xf0/0xf0 [ 1237.861536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1237.862170] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1237.862800] do_syscall_64+0x33/0x40 [ 1237.863249] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1237.863882] RIP: 0033:0x7fc6f5aa4c27 [ 1237.864332] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.866561] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1237.867487] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1237.879779] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1237.880638] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1237.881499] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1237.882355] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:51:02 executing program 2: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) [ 1237.937980] EXT4-fs (loop6): Can't read superblock on 2nd try 07:51:02 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:51:02 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:51:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5) 07:51:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 67) 07:51:02 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1238.544790] FAULT_INJECTION: forcing a failure. [ 1238.544790] name failslab, interval 1, probability 0, space 0, times 0 [ 1238.546487] CPU: 0 PID: 18367 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1238.547330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1238.548358] Call Trace: [ 1238.548691] dump_stack+0x107/0x167 [ 1238.549137] should_fail.cold+0x5/0xa [ 1238.549604] ? __es_insert_extent+0xed1/0x1370 [ 1238.550167] should_failslab+0x5/0x20 [ 1238.550632] kmem_cache_alloc+0x5b/0x310 [ 1238.551128] __es_insert_extent+0xed1/0x1370 [ 1238.551662] ? do_raw_read_unlock+0x70/0x70 [ 1238.552204] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1238.552849] ext4_es_insert_extent+0x45d/0xf10 [ 1238.553413] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1238.553940] ? ext4_es_find_extent_range+0x1cb/0x460 [ 1238.554557] ? lock_downgrade+0x6d0/0x6d0 [ 1238.555069] ? __ext4_handle_dirty_super+0x100/0x100 [ 1238.555691] ? __es_find_extent_range+0x197/0x4b0 [ 1238.556302] ? do_raw_read_unlock+0x3b/0x70 [ 1238.556833] ext4_ext_map_blocks+0x1863/0x5830 [ 1238.557398] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1238.558035] ? find_held_lock+0x2c/0x110 [ 1238.558536] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1238.559178] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1238.559833] ? ext4_ext_release+0x10/0x10 [ 1238.560345] ? lock_release+0x680/0x680 [ 1238.560831] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1238.561407] ? lock_downgrade+0x6d0/0x6d0 [ 1238.561928] ? down_read+0x10f/0x430 [ 1238.562383] ? down_write+0x160/0x160 [ 1238.562853] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1238.563427] ext4_map_blocks+0x8e1/0x1910 [ 1238.563961] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1238.564508] ? __brelse+0x84/0xa0 [ 1238.564931] ? __ext4_new_inode+0x148/0x5370 [ 1238.565474] ext4_append+0x1b8/0x4e0 [ 1238.565931] ? ext4_move_extents+0x3050/0x3050 [ 1238.566488] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1238.567085] ext4_init_new_dir+0x25e/0x4d0 [ 1238.567603] ? ext4_init_dot_dotdot+0x610/0x610 [ 1238.568193] ext4_mkdir+0x3c1/0xb10 [ 1238.568642] ? ext4_rmdir+0xf70/0xf70 [ 1238.569115] vfs_mkdir+0x493/0x750 [ 1238.569552] do_mkdirat+0x150/0x2b0 [ 1238.569997] ? user_path_create+0xf0/0xf0 [ 1238.570505] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1238.571142] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1238.571783] do_syscall_64+0x33/0x40 [ 1238.572259] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1238.572884] RIP: 0033:0x7fc6f5aa4c27 [ 1238.573337] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1238.575571] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1238.576514] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1238.577381] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1238.578250] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1238.579118] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1238.580000] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1238.669308] EXT4-fs (loop6): Can't read superblock on 2nd try 07:51:16 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:51:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 68) 07:51:16 executing program 0: fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:51:16 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:51:16 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:51:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6) 07:51:16 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:51:16 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1252.659101] FAULT_INJECTION: forcing a failure. [ 1252.659101] name failslab, interval 1, probability 0, space 0, times 0 [ 1252.660712] CPU: 1 PID: 18586 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1252.661565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1252.662577] Call Trace: [ 1252.662905] dump_stack+0x107/0x167 [ 1252.663354] should_fail.cold+0x5/0xa [ 1252.663833] ? create_object.isra.0+0x3a/0xa20 [ 1252.664462] should_failslab+0x5/0x20 [ 1252.664981] kmem_cache_alloc+0x5b/0x310 [ 1252.665533] create_object.isra.0+0x3a/0xa20 [ 1252.666127] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1252.666826] __kmalloc+0x16e/0x390 [ 1252.667316] ext4_find_extent+0xa77/0xd70 [ 1252.672446] ext4_ext_map_blocks+0x1c8/0x5830 [ 1252.673049] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1252.680437] ? find_held_lock+0x2c/0x110 [ 1252.680978] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1252.681669] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1252.682360] ? ext4_ext_release+0x10/0x10 [ 1252.682924] ? lock_release+0x680/0x680 [ 1252.683457] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1252.684089] ? lock_downgrade+0x6d0/0x6d0 [ 1252.684663] ? down_read+0x10f/0x430 [ 1252.688337] ? down_write+0x160/0x160 [ 1252.692483] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1252.693117] ext4_map_blocks+0x8e1/0x1910 [ 1252.693675] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1252.700651] ? __brelse+0x84/0xa0 [ 1252.701074] ? __ext4_new_inode+0x148/0x5370 [ 1252.701617] ext4_append+0x1b8/0x4e0 [ 1252.702072] ? ext4_move_extents+0x3050/0x3050 [ 1252.702639] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1252.703234] ext4_init_new_dir+0x25e/0x4d0 [ 1252.703767] ? ext4_init_dot_dotdot+0x610/0x610 [ 1252.704362] ext4_mkdir+0x3c1/0xb10 [ 1252.704814] ? ext4_rmdir+0xf70/0xf70 [ 1252.705285] vfs_mkdir+0x493/0x750 [ 1252.705739] do_mkdirat+0x150/0x2b0 [ 1252.706187] ? user_path_create+0xf0/0xf0 [ 1252.706707] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1252.707344] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1252.707982] do_syscall_64+0x33/0x40 [ 1252.708461] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1252.709102] RIP: 0033:0x7fc6f5aa4c27 [ 1252.709557] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1252.711821] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1252.712779] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1252.713663] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1252.714529] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1252.715401] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1252.716331] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:51:17 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1252.736933] EXT4-fs (loop6): Can't read superblock on 2nd try 07:51:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7) 07:51:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 69) 07:51:17 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:51:17 executing program 0: fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:51:17 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:51:17 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:51:17 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1253.604809] FAULT_INJECTION: forcing a failure. [ 1253.604809] name failslab, interval 1, probability 0, space 0, times 0 [ 1253.606557] CPU: 0 PID: 18810 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1253.607454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1253.608546] Call Trace: [ 1253.608899] dump_stack+0x107/0x167 [ 1253.609375] should_fail.cold+0x5/0xa [ 1253.609877] ? ext4_find_extent+0xa77/0xd70 [ 1253.610439] should_failslab+0x5/0x20 [ 1253.610944] __kmalloc+0x72/0x390 [ 1253.611405] ext4_find_extent+0xa77/0xd70 [ 1253.611960] ext4_ext_map_blocks+0x1c8/0x5830 [ 1253.612581] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1253.613273] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1253.613977] ? ext4_ext_release+0x10/0x10 [ 1253.614532] ? ext4_map_blocks+0x5cd/0x1910 [ 1253.615112] ? lock_release+0x680/0x680 [ 1253.615642] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1253.616278] ? lock_downgrade+0x6d0/0x6d0 [ 1253.616835] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1253.617542] ? down_write+0xe0/0x160 [ 1253.618038] ? down_write_killable+0x180/0x180 [ 1253.618654] ext4_map_blocks+0x63f/0x1910 [ 1253.619210] ? _down_write_nest_lock+0x160/0x160 [ 1253.619838] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1253.620458] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1253.621097] ext4_getblk+0x144/0x680 [ 1253.621596] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1253.622261] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1253.622856] ? __brelse+0x84/0xa0 [ 1253.623316] ? __ext4_new_inode+0x148/0x5370 [ 1253.623906] ext4_bread+0x29/0x1f0 [ 1253.624391] ext4_append+0x228/0x4e0 [ 1253.624890] ? ext4_move_extents+0x3050/0x3050 [ 1253.625496] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1253.626144] ext4_init_new_dir+0x25e/0x4d0 [ 1253.626707] ? ext4_init_dot_dotdot+0x610/0x610 [ 1253.627328] ext4_mkdir+0x3c1/0xb10 [ 1253.627819] ? ext4_rmdir+0xf70/0xf70 [ 1253.628347] vfs_mkdir+0x493/0x750 [ 1253.628790] do_mkdirat+0x150/0x2b0 [ 1253.629234] ? user_path_create+0xf0/0xf0 [ 1253.629741] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1253.630379] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1253.631004] do_syscall_64+0x33/0x40 [ 1253.631455] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1253.632077] RIP: 0033:0x7fc6f5aa4c27 [ 1253.632571] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1253.634947] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1253.635922] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1253.636852] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1253.637789] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1253.638735] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1253.639683] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:51:32 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:51:32 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:51:32 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:51:32 executing program 0: fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:51:32 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:51:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8) 07:51:32 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:51:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 70) [ 1267.893239] FAULT_INJECTION: forcing a failure. [ 1267.893239] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.894644] CPU: 0 PID: 19040 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1267.895494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1267.896508] Call Trace: [ 1267.896844] dump_stack+0x107/0x167 [ 1267.897299] should_fail.cold+0x5/0xa [ 1267.897772] ? create_object.isra.0+0x3a/0xa20 [ 1267.898336] should_failslab+0x5/0x20 [ 1267.898806] kmem_cache_alloc+0x5b/0x310 [ 1267.899311] create_object.isra.0+0x3a/0xa20 [ 1267.899849] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1267.900474] __kmalloc+0x16e/0x390 [ 1267.900932] ext4_find_extent+0xa77/0xd70 [ 1267.901451] ext4_ext_map_blocks+0x1c8/0x5830 [ 1267.902016] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1267.902663] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1267.903312] ? ext4_ext_release+0x10/0x10 [ 1267.903824] ? ext4_map_blocks+0x5cd/0x1910 07:51:32 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1267.904359] ? lock_release+0x680/0x680 [ 1267.904860] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1267.905439] ? lock_downgrade+0x6d0/0x6d0 [ 1267.905947] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1267.906603] ? down_write+0xe0/0x160 [ 1267.907204] ? down_write_killable+0x180/0x180 [ 1267.907772] ext4_map_blocks+0x63f/0x1910 [ 1267.908758] ? _down_write_nest_lock+0x160/0x160 [ 1267.909478] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1267.910068] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1267.910707] ext4_getblk+0x144/0x680 [ 1267.911163] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1267.911827] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1267.912433] ? __brelse+0x84/0xa0 [ 1267.912877] ? __ext4_new_inode+0x148/0x5370 [ 1267.913494] ext4_bread+0x29/0x1f0 [ 1267.913941] ext4_append+0x228/0x4e0 [ 1267.914450] ? ext4_move_extents+0x3050/0x3050 [ 1267.915006] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1267.915652] ext4_init_new_dir+0x25e/0x4d0 [ 1267.916169] ? ext4_init_dot_dotdot+0x610/0x610 [ 1267.916821] ext4_mkdir+0x3c1/0xb10 [ 1267.917369] ? ext4_rmdir+0xf70/0xf70 [ 1267.917843] vfs_mkdir+0x493/0x750 [ 1267.918278] do_mkdirat+0x150/0x2b0 [ 1267.918722] ? user_path_create+0xf0/0xf0 [ 1267.919228] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1267.919863] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1267.920489] do_syscall_64+0x33/0x40 [ 1267.920975] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1267.921600] RIP: 0033:0x7fc6f5aa4c27 [ 1267.922053] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.924285] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1267.925254] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1267.926120] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1267.926984] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1267.927849] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1267.928715] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1267.959904] EXT4-fs (loop6): Can't read superblock on 2nd try 07:51:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 71) 07:51:32 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:51:32 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:51:32 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0x0, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:51:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x9) 07:51:32 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:51:32 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1269.026768] FAULT_INJECTION: forcing a failure. [ 1269.026768] name failslab, interval 1, probability 0, space 0, times 0 [ 1269.031680] CPU: 0 PID: 19263 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1269.032589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1269.033697] Call Trace: [ 1269.034057] dump_stack+0x107/0x167 [ 1269.034542] should_fail.cold+0x5/0xa [ 1269.035041] ? create_object.isra.0+0x3a/0xa20 [ 1269.035648] should_failslab+0x5/0x20 [ 1269.036156] kmem_cache_alloc+0x5b/0x310 [ 1269.036702] create_object.isra.0+0x3a/0xa20 [ 1269.037299] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1269.037971] __kmalloc+0x16e/0x390 [ 1269.038453] ext4_find_extent+0xa77/0xd70 [ 1269.039014] ext4_ext_map_blocks+0x1c8/0x5830 [ 1269.039628] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1269.040319] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1269.041040] ? ext4_ext_release+0x10/0x10 [ 1269.041592] ? ext4_map_blocks+0x5cd/0x1910 [ 1269.042168] ? lock_release+0x680/0x680 [ 1269.042700] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1269.043327] ? lock_downgrade+0x6d0/0x6d0 [ 1269.043876] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1269.044581] ? down_write+0xe0/0x160 [ 1269.051215] ? down_write_killable+0x180/0x180 [ 1269.051894] ext4_map_blocks+0x63f/0x1910 [ 1269.052702] ? _down_write_nest_lock+0x160/0x160 [ 1269.053601] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1269.054393] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1269.055108] ext4_getblk+0x144/0x680 [ 1269.055836] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1269.056703] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1269.057346] ? __brelse+0x84/0xa0 [ 1269.058052] ? __ext4_new_inode+0x148/0x5370 [ 1269.058934] ext4_bread+0x29/0x1f0 [ 1269.059408] ext4_append+0x228/0x4e0 [ 1269.060154] ? ext4_move_extents+0x3050/0x3050 [ 1269.061021] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1269.061706] ? mark_held_locks+0x9e/0xe0 [ 1269.062537] ext4_init_new_dir+0x25e/0x4d0 [ 1269.063303] ? ext4_init_dot_dotdot+0x610/0x610 [ 1269.063982] ext4_mkdir+0x3c1/0xb10 [ 1269.064733] ? ext4_rmdir+0xf70/0xf70 [ 1269.065520] vfs_mkdir+0x493/0x750 [ 1269.065996] do_mkdirat+0x150/0x2b0 [ 1269.066726] ? user_path_create+0xf0/0xf0 [ 1269.067279] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1269.068233] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1269.069183] do_syscall_64+0x33/0x40 [ 1269.069983] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1269.070982] RIP: 0033:0x7fc6f5aa4c27 [ 1269.071538] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1269.074872] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1269.076415] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1269.077670] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1269.078907] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1269.080055] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1269.081264] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1269.167372] EXT4-fs (loop6): Can't read superblock on 2nd try 07:51:47 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:51:47 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:51:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xb) 07:51:47 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0x0, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:51:47 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:51:47 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:51:47 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:51:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 72) 07:51:47 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1283.515351] FAULT_INJECTION: forcing a failure. [ 1283.515351] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.516780] CPU: 0 PID: 19482 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1283.517639] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1283.518650] Call Trace: [ 1283.518978] dump_stack+0x107/0x167 [ 1283.519427] should_fail.cold+0x5/0xa [ 1283.519896] ? ext4_mb_new_blocks+0x698/0x45c0 [ 1283.520459] should_failslab+0x5/0x20 [ 1283.520926] kmem_cache_alloc+0x5b/0x310 [ 1283.521446] ext4_mb_new_blocks+0x698/0x45c0 [ 1283.521994] ? trace_hardirqs_on+0x5b/0x180 [ 1283.522526] ? kasan_unpoison_shadow+0x33/0x50 [ 1283.523081] ? ext4_cache_extents+0x68/0x2d0 [ 1283.523620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1283.524239] ? ext4_discard_preallocations+0xd80/0xd80 [ 1283.524880] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1283.525477] ? ext4_inode_to_goal_block+0x320/0x430 [ 1283.526092] ext4_ext_map_blocks+0x1d49/0x5830 [ 1283.526664] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1283.527300] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1283.527943] ? ext4_ext_release+0x10/0x10 [ 1283.528451] ? ext4_map_blocks+0x5cd/0x1910 [ 1283.528981] ? lock_release+0x680/0x680 [ 1283.529493] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1283.530070] ? lock_downgrade+0x6d0/0x6d0 [ 1283.530571] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1283.531223] ? down_write_killable+0x180/0x180 [ 1283.531786] ext4_map_blocks+0x63f/0x1910 [ 1283.532295] ? _down_write_nest_lock+0x160/0x160 [ 1283.532873] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1283.533434] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1283.534011] ext4_getblk+0x144/0x680 [ 1283.534468] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1283.535070] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1283.535618] ? __brelse+0x84/0xa0 [ 1283.536040] ? __ext4_new_inode+0x148/0x5370 [ 1283.536581] ext4_bread+0x29/0x1f0 [ 1283.537013] ext4_append+0x228/0x4e0 [ 1283.537483] ? ext4_move_extents+0x3050/0x3050 [ 1283.538038] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1283.538631] ext4_init_new_dir+0x25e/0x4d0 [ 1283.539149] ? ext4_init_dot_dotdot+0x610/0x610 [ 1283.545442] ext4_mkdir+0x3c1/0xb10 [ 1283.545892] ? ext4_rmdir+0xf70/0xf70 [ 1283.546363] vfs_mkdir+0x493/0x750 [ 1283.546796] do_mkdirat+0x150/0x2b0 [ 1283.547241] ? user_path_create+0xf0/0xf0 [ 1283.547747] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1283.548382] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1283.549008] do_syscall_64+0x33/0x40 [ 1283.549477] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1283.550098] RIP: 0033:0x7fc6f5aa4c27 [ 1283.550554] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1283.552785] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1283.553731] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1283.554597] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1283.555463] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1283.556329] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1283.557192] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:51:47 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:51:47 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:51:48 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0x0, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:51:48 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:51:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 73) 07:51:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10) 07:51:48 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1284.581916] FAULT_INJECTION: forcing a failure. [ 1284.581916] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.583605] CPU: 1 PID: 19707 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1284.584546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1284.585743] Call Trace: [ 1284.586126] dump_stack+0x107/0x167 [ 1284.586617] should_fail.cold+0x5/0xa [ 1284.587128] ? create_object.isra.0+0x3a/0xa20 [ 1284.587735] should_failslab+0x5/0x20 [ 1284.588244] kmem_cache_alloc+0x5b/0x310 [ 1284.588793] create_object.isra.0+0x3a/0xa20 [ 1284.589415] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.590140] kmem_cache_alloc+0x159/0x310 [ 1284.590703] ext4_mb_new_blocks+0x698/0x45c0 [ 1284.591303] ? trace_hardirqs_on+0x5b/0x180 [ 1284.591887] ? kasan_unpoison_shadow+0x33/0x50 [ 1284.592496] ? ext4_cache_extents+0x68/0x2d0 [ 1284.593080] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1284.593777] ? ext4_discard_preallocations+0xd80/0xd80 [ 1284.594475] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1284.595106] ? ext4_inode_to_goal_block+0x320/0x430 [ 1284.595771] ext4_ext_map_blocks+0x1d49/0x5830 [ 1284.596392] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1284.597115] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1284.597976] ? ext4_ext_release+0x10/0x10 [ 1284.598535] ? ext4_map_blocks+0x5cd/0x1910 [ 1284.599113] ? lock_release+0x680/0x680 [ 1284.599600] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1284.600172] ? lock_downgrade+0x6d0/0x6d0 [ 1284.600691] ? down_write_killable+0x180/0x180 [ 1284.601254] ext4_map_blocks+0x63f/0x1910 [ 1284.601845] ? _down_write_nest_lock+0x160/0x160 [ 1284.602426] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1284.602972] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1284.603550] ext4_getblk+0x144/0x680 [ 1284.604005] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1284.604610] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1284.605155] ? __brelse+0x84/0xa0 [ 1284.605592] ? __ext4_new_inode+0x148/0x5370 [ 1284.606140] ext4_bread+0x29/0x1f0 [ 1284.606575] ext4_append+0x228/0x4e0 [ 1284.607032] ? ext4_move_extents+0x3050/0x3050 [ 1284.607590] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1284.608184] ext4_init_new_dir+0x25e/0x4d0 [ 1284.608700] ? ext4_init_dot_dotdot+0x610/0x610 [ 1284.609274] ext4_mkdir+0x3c1/0xb10 [ 1284.609745] ? ext4_rmdir+0xf70/0xf70 [ 1284.610263] vfs_mkdir+0x493/0x750 [ 1284.610746] do_mkdirat+0x150/0x2b0 [ 1284.611234] ? user_path_create+0xf0/0xf0 [ 1284.611794] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1284.612497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1284.613188] do_syscall_64+0x33/0x40 [ 1284.613675] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1284.614299] RIP: 0033:0x7fc6f5aa4c27 [ 1284.614751] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1284.616983] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1284.617921] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1284.618783] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1284.619644] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1284.620505] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1284.621375] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1284.656581] EXT4-fs (loop6): Can't read superblock on 2nd try 07:52:03 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:03 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:52:03 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:52:03 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:52:03 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:52:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 74) 07:52:03 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:52:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f) [ 1299.227164] FAULT_INJECTION: forcing a failure. [ 1299.227164] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.228832] CPU: 1 PID: 19928 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1299.229845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1299.231029] Call Trace: [ 1299.231418] dump_stack+0x107/0x167 [ 1299.231956] should_fail.cold+0x5/0xa [ 1299.232514] ? create_object.isra.0+0x3a/0xa20 [ 1299.233194] should_failslab+0x5/0x20 [ 1299.233750] kmem_cache_alloc+0x5b/0x310 [ 1299.234284] create_object.isra.0+0x3a/0xa20 [ 1299.234827] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1299.235457] kmem_cache_alloc+0x159/0x310 [ 1299.235971] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 1299.236535] ? trace_hardirqs_on+0x5b/0x180 [ 1299.237065] ? kasan_unpoison_shadow+0x33/0x50 [ 1299.237623] ? ext4_cache_extents+0x68/0x2d0 [ 1299.238174] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1299.238794] ? ext4_discard_preallocations+0xd80/0xd80 [ 1299.239436] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1299.240021] ? ext4_inode_to_goal_block+0x320/0x430 [ 1299.240641] ext4_ext_map_blocks+0x1d49/0x5830 [ 1299.241216] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1299.241871] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1299.242588] ? ext4_ext_release+0x10/0x10 [ 1299.243191] ? ext4_map_blocks+0x5cd/0x1910 [ 1299.243816] ? lock_release+0x680/0x680 [ 1299.249937] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1299.250610] ? lock_downgrade+0x6d0/0x6d0 [ 1299.251198] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1299.251967] ? down_write_killable+0x180/0x180 [ 1299.252636] ext4_map_blocks+0x63f/0x1910 [ 1299.253240] ? _down_write_nest_lock+0x160/0x160 [ 1299.253932] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1299.254587] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1299.255280] ext4_getblk+0x144/0x680 [ 1299.255831] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1299.256562] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1299.257222] ? __brelse+0x84/0xa0 [ 1299.257730] ? __ext4_new_inode+0x148/0x5370 [ 1299.258304] ext4_bread+0x29/0x1f0 [ 1299.258738] ext4_append+0x228/0x4e0 [ 1299.259201] ? ext4_move_extents+0x3050/0x3050 [ 1299.259768] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1299.260372] ext4_init_new_dir+0x25e/0x4d0 [ 1299.260896] ? ext4_init_dot_dotdot+0x610/0x610 [ 1299.261480] ext4_mkdir+0x3c1/0xb10 [ 1299.261951] ? ext4_rmdir+0xf70/0xf70 [ 1299.262521] vfs_mkdir+0x493/0x750 [ 1299.263048] do_mkdirat+0x150/0x2b0 [ 1299.263584] ? user_path_create+0xf0/0xf0 [ 1299.264188] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.264949] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.265701] do_syscall_64+0x33/0x40 [ 1299.266233] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1299.266951] RIP: 0033:0x7fc6f5aa4c27 [ 1299.267470] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.270041] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1299.274715] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1299.275688] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1299.276666] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1299.277636] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1299.278636] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:52:03 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1299.311362] EXT4-fs (loop6): Can't read superblock on 2nd try 07:52:03 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:52:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f0) 07:52:03 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:52:03 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:52:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 75) 07:52:03 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1299.571990] FAULT_INJECTION: forcing a failure. [ 1299.571990] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.573999] CPU: 0 PID: 20153 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1299.574986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1299.576122] Call Trace: [ 1299.576575] dump_stack+0x107/0x167 [ 1299.577024] should_fail.cold+0x5/0xa [ 1299.577629] ? __es_insert_extent+0xed1/0x1370 [ 1299.578332] should_failslab+0x5/0x20 [ 1299.578812] kmem_cache_alloc+0x5b/0x310 [ 1299.579434] __es_insert_extent+0xed1/0x1370 [ 1299.579987] ext4_es_insert_extent+0x45d/0xf10 [ 1299.580629] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1299.581153] ? lock_downgrade+0x6d0/0x6d0 [ 1299.581734] ? down_write_killable+0x180/0x180 [ 1299.582326] ext4_map_blocks+0x80b/0x1910 [ 1299.582893] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1299.583484] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1299.584090] ext4_getblk+0x144/0x680 [ 1299.584583] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1299.585208] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1299.585783] ? __brelse+0x84/0xa0 [ 1299.586223] ? __ext4_new_inode+0x148/0x5370 [ 1299.586765] ext4_bread+0x29/0x1f0 [ 1299.587197] ext4_append+0x228/0x4e0 [ 1299.587652] ? ext4_move_extents+0x3050/0x3050 [ 1299.588208] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1299.588803] ext4_init_new_dir+0x25e/0x4d0 [ 1299.589320] ? ext4_init_dot_dotdot+0x610/0x610 [ 1299.589905] ext4_mkdir+0x3c1/0xb10 [ 1299.590364] ? ext4_rmdir+0xf70/0xf70 [ 1299.590837] vfs_mkdir+0x493/0x750 [ 1299.591273] do_mkdirat+0x150/0x2b0 [ 1299.591719] ? user_path_create+0xf0/0xf0 [ 1299.592227] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1299.592865] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1299.593495] do_syscall_64+0x33/0x40 [ 1299.593956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1299.594585] RIP: 0033:0x7fc6f5aa4c27 [ 1299.595039] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1299.597270] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1299.598216] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1299.599082] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1299.599949] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1299.600816] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1299.601683] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1299.640477] EXT4-fs (loop6): Can't read superblock on 2nd try 07:52:18 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:52:18 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:52:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 76) 07:52:18 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:52:18 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300) 07:52:18 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:52:18 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:52:18 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1314.111098] FAULT_INJECTION: forcing a failure. [ 1314.111098] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.113325] CPU: 1 PID: 20372 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1314.114227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.115461] Call Trace: [ 1314.115807] dump_stack+0x107/0x167 [ 1314.116327] should_fail.cold+0x5/0xa [ 1314.116806] ? __es_insert_extent+0xed1/0x1370 [ 1314.117459] should_failslab+0x5/0x20 [ 1314.117929] kmem_cache_alloc+0x5b/0x310 [ 1314.119606] __es_insert_extent+0xed1/0x1370 [ 1314.120226] ext4_es_insert_extent+0x45d/0xf10 [ 1314.120837] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1314.121473] ? lock_downgrade+0x6d0/0x6d0 [ 1314.122820] ? down_write_killable+0x180/0x180 [ 1314.123449] ext4_map_blocks+0x80b/0x1910 [ 1314.123971] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1314.124579] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1314.125241] ext4_getblk+0x144/0x680 [ 1314.125710] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1314.126393] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1314.126996] ? __brelse+0x84/0xa0 [ 1314.128502] ? __ext4_new_inode+0x148/0x5370 [ 1314.129073] ext4_bread+0x29/0x1f0 [ 1314.129585] ext4_append+0x228/0x4e0 [ 1314.130049] ? ext4_move_extents+0x3050/0x3050 [ 1314.130707] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1314.131393] ext4_init_new_dir+0x25e/0x4d0 [ 1314.131947] ? ext4_init_dot_dotdot+0x610/0x610 [ 1314.132618] ext4_mkdir+0x3c1/0xb10 [ 1314.133100] ? ext4_rmdir+0xf70/0xf70 [ 1314.134864] vfs_mkdir+0x493/0x750 [ 1314.135417] do_mkdirat+0x150/0x2b0 [ 1314.135900] ? user_path_create+0xf0/0xf0 [ 1314.136947] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.137675] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.139217] do_syscall_64+0x33/0x40 [ 1314.139704] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1314.140418] RIP: 0033:0x7fc6f5aa4c27 [ 1314.140922] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.144922] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1314.145936] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1314.146899] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1314.147897] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.148875] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1314.149823] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1314.177191] EXT4-fs (loop6): Can't read superblock on 2nd try 07:52:18 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:52:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 77) 07:52:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x480) 07:52:18 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:52:18 executing program 4: fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:52:18 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:52:18 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:18 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1314.747221] FAULT_INJECTION: forcing a failure. [ 1314.747221] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.748852] CPU: 0 PID: 20594 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1314.749741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1314.754790] Call Trace: [ 1314.755119] dump_stack+0x107/0x167 [ 1314.755566] should_fail.cold+0x5/0xa [ 1314.756035] ? create_object.isra.0+0x3a/0xa20 [ 1314.756593] should_failslab+0x5/0x20 [ 1314.757059] kmem_cache_alloc+0x5b/0x310 [ 1314.757557] create_object.isra.0+0x3a/0xa20 [ 1314.758089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1314.758742] kmem_cache_alloc+0x159/0x310 [ 1314.759249] ext4_mb_new_blocks+0x1fd8/0x45c0 [ 1314.759799] ? trace_hardirqs_on+0x5b/0x180 [ 1314.760326] ? kasan_unpoison_shadow+0x33/0x50 [ 1314.760879] ? ext4_cache_extents+0x68/0x2d0 [ 1314.761411] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1314.762027] ? ext4_discard_preallocations+0xd80/0xd80 [ 1314.762709] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1314.763286] ? ext4_inode_to_goal_block+0x320/0x430 [ 1314.763900] ext4_ext_map_blocks+0x1d49/0x5830 [ 1314.764467] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1314.765105] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1314.765747] ? ext4_ext_release+0x10/0x10 [ 1314.766252] ? ext4_map_blocks+0x5cd/0x1910 [ 1314.766817] ? lock_release+0x680/0x680 [ 1314.767302] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 1314.767879] ? lock_downgrade+0x6d0/0x6d0 [ 1314.768383] ? jbd2_journal_dirty_metadata+0x1bb/0xa10 [ 1314.769034] ? down_write_killable+0x180/0x180 [ 1314.769597] ext4_map_blocks+0x63f/0x1910 [ 1314.770105] ? _down_write_nest_lock+0x160/0x160 [ 1314.770718] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1314.771264] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1314.771842] ext4_getblk+0x144/0x680 [ 1314.772299] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1314.772904] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1314.773450] ? __brelse+0x84/0xa0 [ 1314.773872] ? __ext4_new_inode+0x148/0x5370 [ 1314.774428] ext4_bread+0x29/0x1f0 [ 1314.774892] ext4_append+0x228/0x4e0 [ 1314.775351] ? ext4_move_extents+0x3050/0x3050 [ 1314.775908] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1314.776502] ext4_init_new_dir+0x25e/0x4d0 [ 1314.777017] ? ext4_init_dot_dotdot+0x610/0x610 [ 1314.777590] ext4_mkdir+0x3c1/0xb10 [ 1314.778038] ? ext4_rmdir+0xf70/0xf70 [ 1314.778551] vfs_mkdir+0x493/0x750 [ 1314.779017] do_mkdirat+0x150/0x2b0 [ 1314.779466] ? user_path_create+0xf0/0xf0 [ 1314.779975] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1314.780613] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1314.781243] do_syscall_64+0x33/0x40 [ 1314.781694] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1314.782316] RIP: 0033:0x7fc6f5aa4c27 [ 1314.782806] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1314.785036] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1314.785961] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1314.790888] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1314.791755] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1314.792621] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1314.793486] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1314.836234] EXT4-fs (loop6): Can't read superblock on 2nd try 07:52:39 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:52:39 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:39 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:52:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500) 07:52:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 78) 07:52:39 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:39 executing program 4: fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:52:39 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) [ 1335.406456] FAULT_INJECTION: forcing a failure. [ 1335.406456] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.407916] CPU: 0 PID: 20818 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1335.408787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1335.409833] Call Trace: [ 1335.410164] dump_stack+0x107/0x167 [ 1335.410617] should_fail.cold+0x5/0xa [ 1335.411091] ? create_object.isra.0+0x3a/0xa20 [ 1335.411669] should_failslab+0x5/0x20 [ 1335.412139] kmem_cache_alloc+0x5b/0x310 [ 1335.412644] create_object.isra.0+0x3a/0xa20 [ 1335.413189] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1335.413839] kmem_cache_alloc+0x159/0x310 [ 1335.414366] __es_insert_extent+0xed1/0x1370 [ 1335.414935] ext4_es_insert_extent+0x45d/0xf10 [ 1335.415525] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1335.416062] ? lock_downgrade+0x6d0/0x6d0 [ 1335.416601] ? down_write_killable+0x180/0x180 [ 1335.417174] ext4_map_blocks+0x80b/0x1910 [ 1335.417694] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1335.418244] ? ext4_es_lookup_extent+0xc4/0xaa0 [ 1335.418828] ext4_getblk+0x144/0x680 [ 1335.419313] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1335.419941] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1335.420494] ? __brelse+0x84/0xa0 [ 1335.420930] ? __ext4_new_inode+0x148/0x5370 [ 1335.421478] ext4_bread+0x29/0x1f0 [ 1335.421935] ext4_append+0x228/0x4e0 [ 1335.422396] ? ext4_move_extents+0x3050/0x3050 [ 1335.422965] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1335.423587] ext4_init_new_dir+0x25e/0x4d0 [ 1335.424107] ? ext4_init_dot_dotdot+0x610/0x610 [ 1335.424698] ext4_mkdir+0x3c1/0xb10 [ 1335.425147] ? ext4_rmdir+0xf70/0xf70 [ 1335.425641] vfs_mkdir+0x493/0x750 [ 1335.426079] do_mkdirat+0x150/0x2b0 [ 1335.426535] ? user_path_create+0xf0/0xf0 [ 1335.427049] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1335.427720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1335.428351] do_syscall_64+0x33/0x40 [ 1335.428817] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1335.429445] RIP: 0033:0x7fc6f5aa4c27 [ 1335.429912] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.432224] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1335.433179] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1335.434074] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1335.434966] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1335.435869] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1335.436739] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:52:39 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1335.469097] EXT4-fs (loop6): Can't read superblock on 2nd try 07:52:39 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:52:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600) 07:52:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 79) 07:52:39 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) 07:52:39 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:39 executing program 4: fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r0 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r0, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:52:40 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:40 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) [ 1335.749476] FAULT_INJECTION: forcing a failure. [ 1335.749476] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.751605] CPU: 1 PID: 21038 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1335.752453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1335.753466] Call Trace: [ 1335.753793] dump_stack+0x107/0x167 [ 1335.754243] should_fail.cold+0x5/0xa [ 1335.754714] ? create_object.isra.0+0x3a/0xa20 [ 1335.755292] should_failslab+0x5/0x20 [ 1335.755759] kmem_cache_alloc+0x5b/0x310 [ 1335.756255] create_object.isra.0+0x3a/0xa20 [ 1335.756788] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1335.757405] kmem_cache_alloc+0x159/0x310 [ 1335.757922] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1335.758564] jbd2_journal_get_create_access+0x40/0x560 [ 1335.759224] __ext4_journal_get_create_access+0x43/0x90 [ 1335.759883] ext4_getblk+0x318/0x680 [ 1335.760340] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1335.760950] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1335.761501] ? __brelse+0x84/0xa0 [ 1335.761926] ? __ext4_new_inode+0x148/0x5370 [ 1335.762468] ext4_bread+0x29/0x1f0 [ 1335.762904] ext4_append+0x228/0x4e0 [ 1335.763375] ? ext4_move_extents+0x3050/0x3050 [ 1335.763933] ? ext4_mark_inode_used+0x14b0/0x14b0 [ 1335.764530] ext4_init_new_dir+0x25e/0x4d0 [ 1335.765049] ? ext4_init_dot_dotdot+0x610/0x610 [ 1335.765625] ext4_mkdir+0x3c1/0xb10 [ 1335.766075] ? ext4_rmdir+0xf70/0xf70 [ 1335.766550] vfs_mkdir+0x493/0x750 [ 1335.766987] do_mkdirat+0x150/0x2b0 [ 1335.767471] ? user_path_create+0xf0/0xf0 [ 1335.768000] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1335.768640] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1335.769269] do_syscall_64+0x33/0x40 [ 1335.769724] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1335.770349] RIP: 0033:0x7fc6f5aa4c27 [ 1335.770803] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.773055] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1335.773981] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa4c27 [ 1335.774851] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1335.775788] RBP: 00007fc6f301b040 R08: 0000000000000000 R09: ffffffffffffffff [ 1335.776657] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1335.777525] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1335.801536] EXT4-fs (loop6): Can't read superblock on 2nd try 07:52:54 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:52:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 80) 07:52:54 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:54 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:52:54 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:52:54 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:52:54 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:52:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700) 07:52:54 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1350.167949] FAULT_INJECTION: forcing a failure. [ 1350.167949] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.170646] CPU: 0 PID: 21263 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1350.171913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1350.173526] Call Trace: [ 1350.173998] dump_stack+0x107/0x167 [ 1350.174805] should_fail.cold+0x5/0xa [ 1350.175821] should_failslab+0x5/0x20 [ 1350.176353] __kmalloc_track_caller+0x79/0x370 [ 1350.176916] ? strndup_user+0x74/0xe0 [ 1350.177438] ? dput+0x35/0xcd0 [ 1350.177834] memdup_user+0x22/0xd0 [ 1350.178320] strndup_user+0x74/0xe0 [ 1350.178785] __x64_sys_mount+0x133/0x300 [ 1350.179371] ? copy_mnt_ns+0xa00/0xa00 [ 1350.179874] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1350.180602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1350.181288] do_syscall_64+0x33/0x40 [ 1350.181748] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1350.182431] RIP: 0033:0x7fc6f5aa704a [ 1350.182889] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1350.185503] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1350.186584] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1350.187607] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1350.188577] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1350.189500] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1350.190431] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:52:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 81) 07:52:54 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1351.008357] FAULT_INJECTION: forcing a failure. [ 1351.008357] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1351.009828] CPU: 0 PID: 21387 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1351.010671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1351.011686] Call Trace: [ 1351.012018] dump_stack+0x107/0x167 [ 1351.012462] should_fail.cold+0x5/0xa [ 1351.012933] _copy_from_user+0x2e/0x1b0 [ 1351.013418] memdup_user+0x65/0xd0 [ 1351.013848] strndup_user+0x74/0xe0 [ 1351.014294] __x64_sys_mount+0x133/0x300 [ 1351.014787] ? copy_mnt_ns+0xa00/0xa00 [ 1351.015266] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1351.015924] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1351.016552] do_syscall_64+0x33/0x40 [ 1351.017004] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1351.017629] RIP: 0033:0x7fc6f5aa704a [ 1351.018085] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1351.020341] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1351.021272] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1351.022145] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1351.023016] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1351.023901] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1351.024772] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x900) 07:53:10 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 82) 07:53:10 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:10 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:53:10 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:53:10 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:10 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:53:10 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1366.078650] FAULT_INJECTION: forcing a failure. [ 1366.078650] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.080818] CPU: 0 PID: 21504 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1366.081673] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1366.082677] Call Trace: [ 1366.083006] dump_stack+0x107/0x167 [ 1366.083451] should_fail.cold+0x5/0xa [ 1366.083919] ? create_object.isra.0+0x3a/0xa20 [ 1366.084515] should_failslab+0x5/0x20 [ 1366.084980] kmem_cache_alloc+0x5b/0x310 [ 1366.085477] create_object.isra.0+0x3a/0xa20 [ 1366.086007] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1366.086625] __kmalloc_track_caller+0x177/0x370 [ 1366.087185] ? strndup_user+0x74/0xe0 [ 1366.087645] memdup_user+0x22/0xd0 [ 1366.088073] strndup_user+0x74/0xe0 [ 1366.088560] __x64_sys_mount+0x133/0x300 [ 1366.089057] ? copy_mnt_ns+0xa00/0xa00 [ 1366.089535] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1366.090174] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1366.090802] do_syscall_64+0x33/0x40 [ 1366.091254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1366.091880] RIP: 0033:0x7fc6f5aa704a [ 1366.092371] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1366.094605] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1366.095535] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1366.096439] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1366.097305] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1366.098169] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1366.099034] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xb00) [ 1366.193722] EXT4-fs (loop6): Can't read superblock on 2nd try 07:53:10 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:53:10 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:53:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 83) 07:53:10 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:10 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:53:10 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:10 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1366.452710] FAULT_INJECTION: forcing a failure. [ 1366.452710] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.454132] CPU: 1 PID: 21728 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1366.454968] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1366.455969] Call Trace: [ 1366.456317] dump_stack+0x107/0x167 [ 1366.456762] should_fail.cold+0x5/0xa [ 1366.457230] should_failslab+0x5/0x20 [ 1366.457693] __kmalloc_track_caller+0x79/0x370 [ 1366.458244] ? strndup_user+0x74/0xe0 [ 1366.458707] memdup_user+0x22/0xd0 [ 1366.459137] strndup_user+0x74/0xe0 [ 1366.459579] __x64_sys_mount+0x17c/0x300 [ 1366.460074] ? copy_mnt_ns+0xa00/0xa00 [ 1366.460572] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1366.461211] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1366.461840] do_syscall_64+0x33/0x40 [ 1366.462296] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1366.462924] RIP: 0033:0x7fc6f5aa704a [ 1366.463380] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1366.465638] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1366.466568] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1366.467436] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1366.468322] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1366.469189] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1366.470060] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000) 07:53:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 84) 07:53:25 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:25 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:25 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:53:25 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, 0x0, 0x0) 07:53:25 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f00) 07:53:25 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:25 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, 0x0, 0x0) [ 1381.120965] FAULT_INJECTION: forcing a failure. [ 1381.120965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1381.122707] CPU: 0 PID: 21958 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1381.123612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.124691] Call Trace: [ 1381.125065] dump_stack+0x107/0x167 [ 1381.125547] should_fail.cold+0x5/0xa [ 1381.126055] _copy_from_user+0x2e/0x1b0 [ 1381.126580] memdup_user+0x65/0xd0 [ 1381.127041] strndup_user+0x74/0xe0 [ 1381.127518] __x64_sys_mount+0x17c/0x300 [ 1381.128043] ? copy_mnt_ns+0xa00/0xa00 [ 1381.128563] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.129264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.129939] do_syscall_64+0x33/0x40 [ 1381.130417] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1381.131041] RIP: 0033:0x7fc6f5aa704a [ 1381.131493] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1381.133750] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1381.134674] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1381.135540] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1381.136412] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1381.137325] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1381.138217] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000) 07:53:25 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:53:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 85) 07:53:25 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 07:53:25 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:25 executing program 7: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:25 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:25 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, 0x0, 0x0) [ 1381.489866] FAULT_INJECTION: forcing a failure. [ 1381.489866] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.491370] CPU: 0 PID: 22177 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1381.492215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1381.493235] Call Trace: [ 1381.493561] dump_stack+0x107/0x167 [ 1381.494002] should_fail.cold+0x5/0xa [ 1381.494469] ? copy_mount_options+0x55/0x180 [ 1381.495005] should_failslab+0x5/0x20 [ 1381.495468] kmem_cache_alloc_trace+0x55/0x320 [ 1381.496021] ? _copy_from_user+0xfb/0x1b0 [ 1381.496527] copy_mount_options+0x55/0x180 [ 1381.497057] __x64_sys_mount+0x1a8/0x300 [ 1381.497547] ? copy_mnt_ns+0xa00/0xa00 [ 1381.498024] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1381.498658] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1381.499283] do_syscall_64+0x33/0x40 [ 1381.499738] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1381.500365] RIP: 0033:0x7fc6f5aa704a [ 1381.500834] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1381.503072] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1381.503996] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1381.504880] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1381.505746] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1381.506613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1381.507479] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004) 07:53:40 executing program 7: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:40 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:53:40 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002) 07:53:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 86) 07:53:40 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0), 0x0) 07:53:40 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:40 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:40 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0), 0x0) [ 1395.882517] FAULT_INJECTION: forcing a failure. [ 1395.882517] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.885964] CPU: 0 PID: 22315 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1395.888281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1395.891471] Call Trace: [ 1395.897873] dump_stack+0x107/0x167 [ 1395.899031] should_fail.cold+0x5/0xa [ 1395.900257] should_failslab+0x5/0x20 [ 1395.901472] __kmalloc_track_caller+0x79/0x370 [ 1395.902935] ? strndup_user+0x74/0xe0 [ 1395.904145] memdup_user+0x22/0xd0 [ 1395.905268] strndup_user+0x74/0xe0 [ 1395.906417] __x64_sys_mount+0x17c/0x300 [ 1395.907699] ? copy_mnt_ns+0xa00/0xa00 [ 1395.908941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1395.910617] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1395.912270] do_syscall_64+0x33/0x40 [ 1395.913464] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1395.915109] RIP: 0033:0x7fc6f5aa704a [ 1395.916289] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1395.922245] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1395.924703] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1395.927016] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1395.929334] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1395.931641] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1395.933951] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80000) 07:53:40 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:53:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 87) [ 1396.222932] FAULT_INJECTION: forcing a failure. [ 1396.222932] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.224955] CPU: 1 PID: 22536 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1396.226190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1396.227579] Call Trace: [ 1396.228041] dump_stack+0x107/0x167 [ 1396.228677] should_fail.cold+0x5/0xa [ 1396.229338] ? create_object.isra.0+0x3a/0xa20 [ 1396.230103] should_failslab+0x5/0x20 [ 1396.230764] kmem_cache_alloc+0x5b/0x310 [ 1396.231455] create_object.isra.0+0x3a/0xa20 [ 1396.232189] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1396.233040] kmem_cache_alloc_trace+0x151/0x320 [ 1396.233858] copy_mount_options+0x55/0x180 [ 1396.234589] __x64_sys_mount+0x1a8/0x300 [ 1396.235262] ? copy_mnt_ns+0xa00/0xa00 [ 1396.235951] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1396.236873] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1396.237772] do_syscall_64+0x33/0x40 [ 1396.238385] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1396.239260] RIP: 0033:0x7fc6f5aa704a [ 1396.239896] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1396.243088] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1396.244376] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1396.245623] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1396.246854] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1396.248091] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1396.249320] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1396.255158] EXT4-fs (loop6): Can't read superblock on 2nd try 07:53:54 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000200)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) 07:53:54 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:54 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0), 0x0) 07:53:54 executing program 5: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:54 executing program 7: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:54 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000) 07:53:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 88) [ 1410.192687] FAULT_INJECTION: forcing a failure. [ 1410.192687] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.196274] CPU: 0 PID: 22550 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1410.198361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.200711] Call Trace: [ 1410.201460] dump_stack+0x107/0x167 [ 1410.202660] should_fail.cold+0x5/0xa [ 1410.203760] ? getname_flags.part.0+0x50/0x4f0 [ 1410.205084] should_failslab+0x5/0x20 [ 1410.206316] kmem_cache_alloc+0x5b/0x310 [ 1410.207444] getname_flags.part.0+0x50/0x4f0 [ 1410.208663] user_path_at_empty+0xa1/0x100 [ 1410.209918] __x64_sys_mount+0x1e9/0x300 [ 1410.211058] ? copy_mnt_ns+0xa00/0xa00 [ 1410.212232] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.213733] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.215553] do_syscall_64+0x33/0x40 [ 1410.216600] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1410.218092] RIP: 0033:0x7fc6f5aa704a [ 1410.219254] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.225051] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1410.226461] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1410.227434] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1410.228626] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1410.229547] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1410.230838] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:54 executing program 1: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) 07:53:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 89) 07:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000) 07:53:54 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:54 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000200)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) 07:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000000) [ 1410.432558] FAULT_INJECTION: forcing a failure. [ 1410.432558] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.434077] CPU: 0 PID: 22770 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1410.435035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.436149] Call Trace: [ 1410.436491] dump_stack+0x107/0x167 [ 1410.436940] should_fail.cold+0x5/0xa [ 1410.437461] ? create_object.isra.0+0x3a/0xa20 [ 1410.438036] should_failslab+0x5/0x20 [ 1410.438569] kmem_cache_alloc+0x5b/0x310 [ 1410.439065] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.439794] create_object.isra.0+0x3a/0xa20 [ 1410.440371] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1410.440993] kmem_cache_alloc+0x159/0x310 [ 1410.441553] getname_flags.part.0+0x50/0x4f0 [ 1410.442168] user_path_at_empty+0xa1/0x100 [ 1410.442709] __x64_sys_mount+0x1e9/0x300 [ 1410.443300] ? copy_mnt_ns+0xa00/0xa00 [ 1410.443805] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.444568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.445269] do_syscall_64+0x33/0x40 [ 1410.445753] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1410.448865] RIP: 0033:0x7fc6f5aa704a [ 1410.449390] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.451832] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1410.452863] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1410.453842] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1410.454777] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1410.455724] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1410.456705] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1410.473819] EXT4-fs (loop6): Can't read superblock on 2nd try 07:53:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 90) 07:53:54 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1410.626054] FAULT_INJECTION: forcing a failure. [ 1410.626054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1410.627567] CPU: 1 PID: 22823 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1410.628408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.629788] Call Trace: [ 1410.630195] dump_stack+0x107/0x167 [ 1410.630639] should_fail.cold+0x5/0xa [ 1410.631110] strncpy_from_user+0x34/0x470 [ 1410.631772] getname_flags.part.0+0x95/0x4f0 [ 1410.632529] user_path_at_empty+0xa1/0x100 [ 1410.633090] __x64_sys_mount+0x1e9/0x300 [ 1410.633584] ? copy_mnt_ns+0xa00/0xa00 [ 1410.634092] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.634728] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.635349] do_syscall_64+0x33/0x40 [ 1410.635802] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1410.636429] RIP: 0033:0x7fc6f5aa704a [ 1410.636879] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.639125] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1410.640049] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1410.640915] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1410.641806] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1410.642670] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1410.643534] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000) 07:53:55 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:53:55 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) 07:53:55 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:53:55 executing program 1: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000140)="d7db7da83c10e06252f59252540f36d76550bb654569b47a6a155d031478da6a930b9437523d713fe4b45b03b71e4c6791c4cbc2bed4c9df685af85fb53e1257544b51a4d7d271b1fb92d936bc2c83fc1d0834e614f73bf47a632a255ef6d6ab98cd0d12d031e5774de75014983cb0f227d63a60618f5ce232ad4c6a53129ef074e89c022692e07cde95448c46c025f6dd1e42fc63ba359cebc2", 0x9a}, {&(0x7f0000000300)="fd9d0fd7a6d0", 0x6}], 0x3, &(0x7f0000001440)=[@mark={{0x14, 0x1, 0x24, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}, @timestamping={{0x14, 0x1, 0x25, 0xe0000}}, @mark={{0x14, 0x1, 0x24, 0x8df}}, @txtime={{0x18, 0x1, 0x3d, 0xfa9}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x90}}], 0x1, 0x20000040) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:53:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 91) [ 1410.809299] FAULT_INJECTION: forcing a failure. [ 1410.809299] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.810941] CPU: 0 PID: 22991 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1410.811887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.813037] Call Trace: [ 1410.813416] dump_stack+0x107/0x167 [ 1410.813923] should_fail.cold+0x5/0xa [ 1410.814454] ? create_object.isra.0+0x3a/0xa20 [ 1410.815078] should_failslab+0x5/0x20 [ 1410.815608] kmem_cache_alloc+0x5b/0x310 [ 1410.816169] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.816888] create_object.isra.0+0x3a/0xa20 [ 1410.817491] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1410.818193] kmem_cache_alloc+0x159/0x310 [ 1410.818764] getname_flags.part.0+0x50/0x4f0 [ 1410.819365] user_path_at_empty+0xa1/0x100 [ 1410.819941] __x64_sys_mount+0x1e9/0x300 [ 1410.820491] ? copy_mnt_ns+0xa00/0xa00 [ 1410.821025] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.821749] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.822450] do_syscall_64+0x33/0x40 [ 1410.822961] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1410.823664] RIP: 0033:0x7fc6f5aa704a [ 1410.824179] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.826624] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1410.827557] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1410.828478] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1410.829430] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1410.830397] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1410.831374] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1410.866618] EXT4-fs (loop6): Can't read superblock on 2nd try 07:54:09 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000200)) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) 07:54:09 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:54:09 executing program 2: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) 07:54:09 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:54:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x3000000) 07:54:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 92) 07:54:09 executing program 1: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:54:09 executing program 5: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1425.430903] FAULT_INJECTION: forcing a failure. [ 1425.430903] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.434698] CPU: 0 PID: 23117 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1425.436913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1425.439606] Call Trace: [ 1425.440442] dump_stack+0x107/0x167 [ 1425.441595] should_fail.cold+0x5/0xa [ 1425.442828] ? create_object.isra.0+0x3a/0xa20 [ 1425.444280] should_failslab+0x5/0x20 [ 1425.445494] kmem_cache_alloc+0x5b/0x310 [ 1425.446815] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1425.448504] create_object.isra.0+0x3a/0xa20 [ 1425.449911] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1425.451579] kmem_cache_alloc+0x159/0x310 [ 1425.452920] getname_flags.part.0+0x50/0x4f0 [ 1425.454388] user_path_at_empty+0xa1/0x100 [ 1425.455762] __x64_sys_mount+0x1e9/0x300 [ 1425.457070] ? copy_mnt_ns+0xa00/0xa00 [ 1425.458353] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1425.460055] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1425.461734] do_syscall_64+0x33/0x40 [ 1425.462943] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1425.464595] RIP: 0033:0x7fc6f5aa704a [ 1425.465788] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1425.471771] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1425.474217] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1425.476532] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1425.478848] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1425.481182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1425.483516] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1425.512627] EXT4-fs (loop6): Can't read superblock on 2nd try 07:54:09 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:54:09 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:54:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 93) [ 1425.808790] FAULT_INJECTION: forcing a failure. [ 1425.808790] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.812843] CPU: 0 PID: 23339 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1425.815193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1425.818065] Call Trace: [ 1425.818981] dump_stack+0x107/0x167 [ 1425.820233] should_fail.cold+0x5/0xa [ 1425.821507] ? create_object.isra.0+0x3a/0xa20 [ 1425.823099] should_failslab+0x5/0x20 [ 1425.824390] kmem_cache_alloc+0x5b/0x310 [ 1425.825798] create_object.isra.0+0x3a/0xa20 [ 1425.827288] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1425.829079] kmem_cache_alloc_trace+0x151/0x320 [ 1425.830714] alloc_fs_context+0x57/0x840 [ 1425.832103] path_mount+0xaa3/0x2120 [ 1425.833404] ? strncpy_from_user+0x9e/0x470 [ 1425.834942] ? finish_automount+0xa90/0xa90 [ 1425.836408] ? getname_flags.part.0+0x1dd/0x4f0 [ 1425.838022] __x64_sys_mount+0x282/0x300 [ 1425.839396] ? copy_mnt_ns+0xa00/0xa00 [ 1425.840795] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1425.842545] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1425.844348] do_syscall_64+0x33/0x40 [ 1425.845632] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1425.847363] RIP: 0033:0x7fc6f5aa704a [ 1425.848693] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1425.855067] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1425.857711] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1425.860143] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1425.862625] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1425.868021] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1425.870488] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1425.919973] EXT4-fs (loop6): Can't read superblock on 2nd try 07:54:24 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) (fail_nth: 1) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:54:24 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:54:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 94) 07:54:24 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) (fail_nth: 1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:54:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000) 07:54:24 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) (fail_nth: 1) 07:54:24 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:54:24 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1440.130230] FAULT_INJECTION: forcing a failure. [ 1440.130230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1440.132073] CPU: 0 PID: 23559 Comm: syz-executor.2 Not tainted 5.10.228 #1 [ 1440.132918] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.133924] Call Trace: [ 1440.134253] dump_stack+0x107/0x167 [ 1440.134707] should_fail.cold+0x5/0xa [ 1440.135193] __alloc_pages_nodemask+0x182/0x600 [ 1440.135763] ? __lock_acquire+0xbb1/0x5b00 [ 1440.136283] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 1440.137022] ? __mutex_lock+0x4fe/0x10b0 [ 1440.137527] ? snd_seq_write+0x1ed/0x690 [ 1440.138030] kmalloc_large_node+0x55/0x1a0 [ 1440.138551] __kmalloc_node+0x30d/0x420 [ 1440.139052] ? lock_acquire+0x197/0x470 [ 1440.139545] kvmalloc_node+0xc0/0x170 [ 1440.140012] snd_seq_pool_init+0x8a/0x310 [ 1440.140520] snd_seq_write+0x5cd/0x690 [ 1440.140997] ? _cond_resched+0x12/0x80 [ 1440.141476] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1440.142139] ? security_file_permission+0xb1/0xe0 [ 1440.142731] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1440.143413] vfs_write+0x29a/0xb10 [ 1440.143853] ksys_write+0x1f6/0x260 [ 1440.144299] ? __ia32_sys_read+0xb0/0xb0 [ 1440.144798] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1440.145438] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1440.146069] do_syscall_64+0x33/0x40 [ 1440.146529] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1440.147173] RIP: 0033:0x7f6ebf780b19 [ 1440.147626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1440.149848] RSP: 002b:00007f6ebccf6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1440.150783] RAX: ffffffffffffffda RBX: 00007f6ebf893f60 RCX: 00007f6ebf780b19 [ 1440.151653] RDX: 00000000200002dc RSI: 00000000200002c0 RDI: 0000000000000003 [ 1440.152517] RBP: 00007f6ebccf61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1440.153382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1440.154246] R13: 00007ffd5b43810f R14: 00007f6ebccf6300 R15: 0000000000022000 [ 1440.162267] FAULT_INJECTION: forcing a failure. [ 1440.162267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1440.167253] CPU: 0 PID: 23564 Comm: syz-executor.5 Not tainted 5.10.228 #1 [ 1440.175008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.176019] Call Trace: [ 1440.176341] dump_stack+0x107/0x167 [ 1440.176783] should_fail.cold+0x5/0xa [ 1440.177254] _copy_to_user+0x2e/0x180 [ 1440.177723] simple_read_from_buffer+0xcc/0x160 [ 1440.178298] proc_fail_nth_read+0x198/0x230 [ 1440.178836] ? proc_sessionid_read+0x230/0x230 [ 1440.179395] ? security_file_permission+0xb1/0xe0 [ 1440.179984] ? proc_sessionid_read+0x230/0x230 [ 1440.180544] vfs_read+0x228/0x620 [ 1440.180970] ksys_read+0x12d/0x260 [ 1440.181401] ? vfs_write+0xb10/0xb10 [ 1440.181858] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1440.182496] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1440.183140] do_syscall_64+0x33/0x40 [ 1440.183593] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1440.184215] RIP: 0033:0x7f55ce64569c [ 1440.184669] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1440.186920] RSP: 002b:00007f55cbbe7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1440.187851] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f55ce64569c [ 1440.188716] RDX: 000000000000000f RSI: 00007f55cbbe71e0 RDI: 0000000000000004 [ 1440.189580] RBP: 00007f55cbbe71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1440.190443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1440.191325] R13: 00007ffc828976af R14: 00007f55cbbe7300 R15: 0000000000022000 [ 1440.200311] FAULT_INJECTION: forcing a failure. [ 1440.200311] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.201688] CPU: 1 PID: 23555 Comm: syz-executor.6 Not tainted 5.10.228 #1 07:54:24 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) (fail_nth: 2) [ 1440.202529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.218986] Call Trace: [ 1440.219310] dump_stack+0x107/0x167 [ 1440.219754] should_fail.cold+0x5/0xa [ 1440.220222] ? create_object.isra.0+0x3a/0xa20 [ 1440.220780] should_failslab+0x5/0x20 [ 1440.221244] kmem_cache_alloc+0x5b/0x310 [ 1440.221741] create_object.isra.0+0x3a/0xa20 [ 1440.222273] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1440.222919] kmem_cache_alloc_trace+0x151/0x320 [ 1440.223484] ? lockdep_init_map_type+0x2c7/0x780 [ 1440.224064] legacy_init_fs_context+0x44/0xe0 [ 1440.224608] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1440.225214] alloc_fs_context+0x4fd/0x840 [ 1440.225725] path_mount+0xaa3/0x2120 [ 1440.226181] ? strncpy_from_user+0x9e/0x470 [ 1440.226703] ? finish_automount+0xa90/0xa90 [ 1440.227241] ? getname_flags.part.0+0x1dd/0x4f0 [ 1440.227811] __x64_sys_mount+0x282/0x300 [ 1440.228302] ? copy_mnt_ns+0xa00/0xa00 [ 1440.228778] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1440.229416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1440.230041] do_syscall_64+0x33/0x40 [ 1440.230493] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1440.231130] RIP: 0033:0x7fc6f5aa704a [ 1440.231582] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1440.233830] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1440.234784] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1440.235679] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1440.236544] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1440.237404] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1440.238280] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1440.241185] FAULT_INJECTION: forcing a failure. [ 1440.241185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1440.242621] CPU: 1 PID: 23553 Comm: syz-executor.1 Not tainted 5.10.228 #1 [ 1440.247438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.248445] Call Trace: [ 1440.248765] dump_stack+0x107/0x167 [ 1440.249208] should_fail.cold+0x5/0xa [ 1440.249674] _copy_to_user+0x2e/0x180 [ 1440.250143] simple_read_from_buffer+0xcc/0x160 [ 1440.250712] proc_fail_nth_read+0x198/0x230 [ 1440.251258] ? proc_sessionid_read+0x230/0x230 [ 1440.251819] ? security_file_permission+0xb1/0xe0 [ 1440.252409] ? proc_sessionid_read+0x230/0x230 [ 1440.252965] vfs_read+0x228/0x620 [ 1440.253391] ksys_read+0x12d/0x260 [ 1440.253824] ? vfs_write+0xb10/0xb10 [ 1440.254281] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1440.254942] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1440.255570] do_syscall_64+0x33/0x40 [ 1440.256023] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1440.256645] RIP: 0033:0x7f1eb5c9169c [ 1440.257098] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1440.259360] RSP: 002b:00007f1eb3254170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1440.260284] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1eb5c9169c [ 1440.261148] RDX: 000000000000000f RSI: 00007f1eb32541e0 RDI: 0000000000000004 07:54:24 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1440.262012] RBP: 00007f1eb32541d0 R08: 0000000000000000 R09: 0000000000000000 [ 1440.262894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1440.271157] R13: 00007fffca1f90cf R14: 00007f1eb3254300 R15: 0000000000022000 [ 1440.276546] EXT4-fs (loop6): Can't read superblock on 2nd try 07:54:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x5000000) 07:54:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 95) 07:54:24 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:54:24 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:54:24 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x0, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:54:24 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) [ 1441.023667] FAULT_INJECTION: forcing a failure. [ 1441.023667] name failslab, interval 1, probability 0, space 0, times 0 [ 1441.026695] CPU: 0 PID: 23773 Comm: syz-executor.2 Not tainted 5.10.228 #1 [ 1441.027614] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1441.029666] Call Trace: [ 1441.030398] dump_stack+0x107/0x167 [ 1441.031280] should_fail.cold+0x5/0xa [ 1441.039175] ? create_object.isra.0+0x3a/0xa20 [ 1441.039736] should_failslab+0x5/0x20 [ 1441.040200] kmem_cache_alloc+0x5b/0x310 [ 1441.040697] create_object.isra.0+0x3a/0xa20 [ 1441.041230] ? kasan_unpoison_shadow+0x33/0x50 [ 1441.041789] kmalloc_large_node+0x124/0x1a0 [ 1441.042318] __kmalloc_node+0x30d/0x420 [ 1441.042810] ? lock_acquire+0x197/0x470 [ 1441.043332] kvmalloc_node+0xc0/0x170 [ 1441.043798] snd_seq_pool_init+0x8a/0x310 [ 1441.044306] snd_seq_write+0x5cd/0x690 [ 1441.044786] ? _cond_resched+0x12/0x80 [ 1441.045263] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1441.045927] ? security_file_permission+0xb1/0xe0 [ 1441.046516] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1441.047207] vfs_write+0x29a/0xb10 [ 1441.047649] ksys_write+0x1f6/0x260 [ 1441.048092] ? __ia32_sys_read+0xb0/0xb0 [ 1441.048589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1441.049226] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1441.049853] do_syscall_64+0x33/0x40 [ 1441.050307] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1441.050961] RIP: 0033:0x7f6ebf780b19 [ 1441.051417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1441.053654] RSP: 002b:00007f6ebccf6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1441.054583] RAX: ffffffffffffffda RBX: 00007f6ebf893f60 RCX: 00007f6ebf780b19 [ 1441.055520] RDX: 00000000200002dc RSI: 00000000200002c0 RDI: 0000000000000003 [ 1441.056563] RBP: 00007f6ebccf61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1441.057598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1441.058632] R13: 00007ffd5b43810f R14: 00007f6ebccf6300 R15: 0000000000022000 07:54:25 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) (fail_nth: 3) 07:54:25 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1441.272210] FAULT_INJECTION: forcing a failure. [ 1441.272210] name failslab, interval 1, probability 0, space 0, times 0 [ 1441.279255] CPU: 0 PID: 23783 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1441.283524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1441.284524] Call Trace: [ 1441.284855] dump_stack+0x107/0x167 [ 1441.285301] should_fail.cold+0x5/0xa [ 1441.285775] should_failslab+0x5/0x20 [ 1441.286238] __kmalloc_track_caller+0x79/0x370 [ 1441.286804] ? vfs_parse_fs_string+0xc0/0x150 [ 1441.287358] kmemdup_nul+0x2d/0xa0 [ 1441.287792] vfs_parse_fs_string+0xc0/0x150 [ 1441.288326] ? vfs_parse_fs_param+0x560/0x560 [ 1441.288879] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1441.289498] ? alloc_fs_context+0x54f/0x840 [ 1441.290041] path_mount+0x63c/0x2120 [ 1441.290516] ? strncpy_from_user+0x9e/0x470 [ 1441.291062] ? finish_automount+0xa90/0xa90 [ 1441.291604] ? getname_flags.part.0+0x1dd/0x4f0 [ 1441.292193] __x64_sys_mount+0x282/0x300 [ 1441.292696] ? copy_mnt_ns+0xa00/0xa00 [ 1441.293189] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1441.293845] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1441.294490] do_syscall_64+0x33/0x40 [ 1441.294955] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1441.295598] RIP: 0033:0x7fc6f5aa704a [ 1441.296063] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1441.298354] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1441.299886] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1441.301622] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1441.303494] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1441.305238] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1441.306924] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:54:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x6000000) [ 1441.571022] FAULT_INJECTION: forcing a failure. [ 1441.571022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1441.572550] CPU: 0 PID: 23995 Comm: syz-executor.2 Not tainted 5.10.228 #1 [ 1441.573391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1441.574410] Call Trace: [ 1441.574737] dump_stack+0x107/0x167 [ 1441.575250] should_fail.cold+0x5/0xa [ 1441.575727] _copy_from_user+0x2e/0x1b0 [ 1441.576221] snd_seq_write+0x40b/0x690 [ 1441.576708] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1441.577377] ? security_file_permission+0xb1/0xe0 [ 1441.577976] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1441.578645] vfs_write+0x29a/0xb10 [ 1441.579102] ksys_write+0x1f6/0x260 [ 1441.579550] ? __ia32_sys_read+0xb0/0xb0 [ 1441.580056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1441.580702] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1441.581334] do_syscall_64+0x33/0x40 [ 1441.581792] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1441.582424] RIP: 0033:0x7f6ebf780b19 [ 1441.582894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1441.585160] RSP: 002b:00007f6ebccf6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1441.586094] RAX: ffffffffffffffda RBX: 00007f6ebf893f60 RCX: 00007f6ebf780b19 [ 1441.586987] RDX: 00000000200002dc RSI: 00000000200002c0 RDI: 0000000000000003 [ 1441.587861] RBP: 00007f6ebccf61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1441.588734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1441.589608] R13: 00007ffd5b43810f R14: 00007f6ebccf6300 R15: 0000000000022000 07:54:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 96) 07:54:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7000000) 07:54:39 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:54:39 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x301, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:54:39 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:54:39 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:54:39 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x0, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:54:39 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) (fail_nth: 4) [ 1455.720626] FAULT_INJECTION: forcing a failure. [ 1455.720626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1455.722079] CPU: 1 PID: 24020 Comm: syz-executor.2 Not tainted 5.10.228 #1 [ 1455.722915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1455.727936] Call Trace: [ 1455.728262] dump_stack+0x107/0x167 [ 1455.728704] should_fail.cold+0x5/0xa [ 1455.729172] _copy_from_user+0x2e/0x1b0 [ 1455.729658] snd_seq_write+0x40b/0x690 [ 1455.730137] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1455.730793] ? security_file_permission+0xb1/0xe0 [ 1455.731398] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1455.732059] vfs_write+0x29a/0xb10 [ 1455.732495] ksys_write+0x1f6/0x260 [ 1455.732937] ? __ia32_sys_read+0xb0/0xb0 [ 1455.733433] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1455.734069] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1455.734695] do_syscall_64+0x33/0x40 [ 1455.735146] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1455.735782] RIP: 0033:0x7f6ebf780b19 [ 1455.736234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1455.738466] RSP: 002b:00007f6ebccf6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1455.739404] RAX: ffffffffffffffda RBX: 00007f6ebf893f60 RCX: 00007f6ebf780b19 [ 1455.740280] RDX: 00000000200002dc RSI: 00000000200002c0 RDI: 0000000000000003 [ 1455.741144] RBP: 00007f6ebccf61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1455.742008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1455.742870] R13: 00007ffd5b43810f R14: 00007f6ebccf6300 R15: 0000000000022000 [ 1455.745614] FAULT_INJECTION: forcing a failure. [ 1455.745614] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.746970] CPU: 1 PID: 24010 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1455.747827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1455.748843] Call Trace: [ 1455.749164] dump_stack+0x107/0x167 [ 1455.749613] should_fail.cold+0x5/0xa [ 1455.750081] ? legacy_init_fs_context+0x44/0xe0 [ 1455.750655] should_failslab+0x5/0x20 [ 1455.751121] kmem_cache_alloc_trace+0x55/0x320 [ 1455.755715] ? lockdep_init_map_type+0x2c7/0x780 [ 1455.756300] legacy_init_fs_context+0x44/0xe0 [ 1455.756851] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1455.757464] alloc_fs_context+0x4fd/0x840 [ 1455.757977] path_mount+0xaa3/0x2120 [ 1455.758442] ? strncpy_from_user+0x9e/0x470 [ 1455.758977] ? finish_automount+0xa90/0xa90 [ 1455.759518] ? getname_flags.part.0+0x1dd/0x4f0 [ 1455.760097] __x64_sys_mount+0x282/0x300 [ 1455.760598] ? copy_mnt_ns+0xa00/0xa00 [ 1455.761078] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1455.761724] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1455.762352] do_syscall_64+0x33/0x40 [ 1455.762810] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1455.763456] RIP: 0033:0x7fc6f5aa704a [ 1455.763913] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1455.766160] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1455.767091] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1455.767981] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1455.768858] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1455.769734] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1455.770615] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:54:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x9000000) 07:54:40 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:54:40 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) (fail_nth: 5) 07:54:40 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:54:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 97) 07:54:40 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x125d, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:54:40 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x301, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:54:40 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x0, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1457.389930] FAULT_INJECTION: forcing a failure. [ 1457.389930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1457.391397] CPU: 0 PID: 24237 Comm: syz-executor.2 Not tainted 5.10.228 #1 [ 1457.393443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1457.395438] Call Trace: [ 1457.395770] dump_stack+0x107/0x167 [ 1457.396237] should_fail.cold+0x5/0xa [ 1457.396717] _copy_from_user+0x2e/0x1b0 [ 1457.397209] snd_seq_write+0x40b/0x690 [ 1457.397698] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1457.398364] ? security_file_permission+0xb1/0xe0 [ 1457.398965] ? snd_seq_kernel_client_enqueue+0x1d0/0x1d0 [ 1457.399685] vfs_write+0x29a/0xb10 [ 1457.400129] ksys_write+0x1f6/0x260 [ 1457.400577] ? __ia32_sys_read+0xb0/0xb0 [ 1457.401085] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1457.401731] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1457.402368] do_syscall_64+0x33/0x40 [ 1457.402826] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1457.403604] RIP: 0033:0x7f6ebf780b19 [ 1457.404496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1457.408202] RSP: 002b:00007f6ebccf6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1457.409140] RAX: ffffffffffffffda RBX: 00007f6ebf893f60 RCX: 00007f6ebf780b19 [ 1457.410016] RDX: 00000000200002dc RSI: 00000000200002c0 RDI: 0000000000000003 [ 1457.410889] RBP: 00007f6ebccf61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1457.412322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1457.414051] R13: 00007ffd5b43810f R14: 00007f6ebccf6300 R15: 0000000000022000 [ 1457.477661] FAULT_INJECTION: forcing a failure. [ 1457.477661] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.481008] CPU: 0 PID: 24242 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1457.482690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1457.484975] Call Trace: [ 1457.485605] dump_stack+0x107/0x167 [ 1457.486481] should_fail.cold+0x5/0xa [ 1457.487426] ? create_object.isra.0+0x3a/0xa20 [ 1457.488724] should_failslab+0x5/0x20 [ 1457.495559] kmem_cache_alloc+0x5b/0x310 [ 1457.496054] create_object.isra.0+0x3a/0xa20 [ 1457.496585] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1457.497204] kmem_cache_alloc_trace+0x151/0x320 [ 1457.497770] ? lockdep_init_map_type+0x2c7/0x780 [ 1457.498354] legacy_init_fs_context+0x44/0xe0 [ 1457.498905] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1457.499532] alloc_fs_context+0x4fd/0x840 [ 1457.500044] path_mount+0xaa3/0x2120 [ 1457.500505] ? strncpy_from_user+0x9e/0x470 [ 1457.501031] ? finish_automount+0xa90/0xa90 [ 1457.501556] ? getname_flags.part.0+0x1dd/0x4f0 [ 1457.502129] __x64_sys_mount+0x282/0x300 [ 1457.502624] ? copy_mnt_ns+0xa00/0xa00 [ 1457.503100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1457.503761] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1457.504396] do_syscall_64+0x33/0x40 [ 1457.504847] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1457.505474] RIP: 0033:0x7fc6f5aa704a [ 1457.505928] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1457.508189] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1457.509115] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1457.509980] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1457.510843] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1457.511726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1457.512597] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1457.579769] EXT4-fs (loop6): Can't read superblock on 2nd try 07:54:55 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:54:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 98) 07:54:55 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) (fail_nth: 6) 07:54:55 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x125d, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:54:55 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x125e, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:54:55 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:54:55 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:54:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xb000000) [ 1471.693602] FAULT_INJECTION: forcing a failure. [ 1471.693602] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1471.701261] CPU: 1 PID: 24458 Comm: syz-executor.2 Not tainted 5.10.228 #1 [ 1471.708606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1471.709564] Call Trace: [ 1471.709874] dump_stack+0x107/0x167 [ 1471.710300] should_fail.cold+0x5/0xa [ 1471.710749] _copy_to_user+0x2e/0x180 [ 1471.711194] simple_read_from_buffer+0xcc/0x160 [ 1471.711741] proc_fail_nth_read+0x198/0x230 [ 1471.712258] ? proc_sessionid_read+0x230/0x230 [ 1471.712790] ? security_file_permission+0xb1/0xe0 [ 1471.713351] ? proc_sessionid_read+0x230/0x230 [ 1471.713879] vfs_read+0x228/0x620 [ 1471.714285] ksys_read+0x12d/0x260 [ 1471.714697] ? vfs_write+0xb10/0xb10 [ 1471.715130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1471.715737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1471.716353] do_syscall_64+0x33/0x40 [ 1471.716786] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1471.717378] RIP: 0033:0x7f6ebf73369c [ 1471.717812] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1471.719952] RSP: 002b:00007f6ebccf6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1471.720836] RAX: ffffffffffffffda RBX: 0000000000000038 RCX: 00007f6ebf73369c [ 1471.721662] RDX: 000000000000000f RSI: 00007f6ebccf61e0 RDI: 0000000000000005 [ 1471.722488] RBP: 00007f6ebccf61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.723313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1471.724152] R13: 00007ffd5b43810f R14: 00007f6ebccf6300 R15: 0000000000022000 07:54:56 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1471.753587] FAULT_INJECTION: forcing a failure. [ 1471.753587] name failslab, interval 1, probability 0, space 0, times 0 [ 1471.755057] CPU: 1 PID: 24465 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1471.755967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1471.756950] Call Trace: [ 1471.757264] dump_stack+0x107/0x167 [ 1471.757690] should_fail.cold+0x5/0xa [ 1471.758142] should_failslab+0x5/0x20 [ 1471.758609] __kmalloc_track_caller+0x79/0x370 [ 1471.759154] ? vfs_parse_fs_string+0xc0/0x150 [ 1471.759715] kmemdup_nul+0x2d/0xa0 [ 1471.760149] vfs_parse_fs_string+0xc0/0x150 [ 1471.760690] ? vfs_parse_fs_param+0x560/0x560 [ 1471.761243] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1471.761831] ? alloc_fs_context+0x54f/0x840 [ 1471.762341] path_mount+0x63c/0x2120 [ 1471.762782] ? strncpy_from_user+0x9e/0x470 [ 1471.763283] ? finish_automount+0xa90/0xa90 [ 1471.763789] ? getname_flags.part.0+0x1dd/0x4f0 [ 1471.764356] __x64_sys_mount+0x282/0x300 [ 1471.764832] ? copy_mnt_ns+0xa00/0xa00 [ 1471.765288] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1471.765912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1471.766515] do_syscall_64+0x33/0x40 [ 1471.766951] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1471.767580] RIP: 0033:0x7fc6f5aa704a [ 1471.768026] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1471.770197] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1471.771085] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1471.771923] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1471.772793] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1471.773624] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1471.774471] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:54:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000) 07:54:56 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 99) 07:54:56 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:54:56 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x125f, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:54:56 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:54:56 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x125e, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:54:56 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1472.780380] FAULT_INJECTION: forcing a failure. [ 1472.780380] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.782138] CPU: 0 PID: 24692 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1472.782985] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1472.784024] Call Trace: [ 1472.784355] dump_stack+0x107/0x167 [ 1472.784806] should_fail.cold+0x5/0xa [ 1472.785273] ? alloc_super+0x52/0xa90 [ 1472.785753] should_failslab+0x5/0x20 [ 1472.786226] kmem_cache_alloc_trace+0x55/0x320 [ 1472.786792] ? do_raw_spin_lock+0x121/0x260 [ 1472.787325] alloc_super+0x52/0xa90 [ 1472.787777] ? test_bdev_super_fc+0x80/0x80 [ 1472.792337] sget+0x110/0x510 [ 1472.792726] ? __put_super.part.0+0x2a0/0x2a0 [ 1472.793281] mount_bdev+0xf8/0x400 [ 1472.793723] ? ext4_calculate_overhead+0x1340/0x1340 [ 1472.794354] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1472.794889] legacy_get_tree+0x105/0x220 [ 1472.795391] vfs_get_tree+0x8e/0x300 [ 1472.795850] path_mount+0x1429/0x2120 [ 1472.796347] ? strncpy_from_user+0x9e/0x470 [ 1472.796876] ? finish_automount+0xa90/0xa90 [ 1472.797400] ? getname_flags.part.0+0x1dd/0x4f0 [ 1472.797970] __x64_sys_mount+0x282/0x300 [ 1472.798462] ? copy_mnt_ns+0xa00/0xa00 [ 1472.798940] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1472.799577] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1472.800246] do_syscall_64+0x33/0x40 [ 1472.800706] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1472.801338] RIP: 0033:0x7fc6f5aa704a [ 1472.801804] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1472.804071] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1472.805001] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1472.805868] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1472.806737] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1472.807607] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1472.808500] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 07:55:11 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:11 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:55:11 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x125f, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:55:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f000000) 07:55:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) (fail_nth: 100) 07:55:11 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:55:11 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0x0, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:55:11 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1260, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1487.109228] FAULT_INJECTION: forcing a failure. [ 1487.109228] name failslab, interval 1, probability 0, space 0, times 0 [ 1487.110624] CPU: 1 PID: 24911 Comm: syz-executor.6 Not tainted 5.10.228 #1 [ 1487.111463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1487.112489] Call Trace: [ 1487.112841] dump_stack+0x107/0x167 [ 1487.113308] should_fail.cold+0x5/0xa [ 1487.113782] ? create_object.isra.0+0x3a/0xa20 [ 1487.114340] should_failslab+0x5/0x20 [ 1487.114809] kmem_cache_alloc+0x5b/0x310 [ 1487.115932] create_object.isra.0+0x3a/0xa20 07:55:11 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1260, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1487.116480] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1487.117126] kmem_cache_alloc+0x159/0x310 [ 1487.117636] getname_kernel+0x4e/0x370 [ 1487.118111] kern_path+0x1b/0x40 [ 1487.118528] lookup_bdev+0x100/0x220 [ 1487.118982] ? bd_acquire+0x450/0x450 [ 1487.119446] ? kfree+0x1ab/0x340 [ 1487.119861] ? logfc+0x590/0x590 [ 1487.120279] blkdev_get_by_path+0x1b/0x110 [ 1487.122690] mount_bdev+0x5b/0x400 [ 1487.123124] ? ext4_calculate_overhead+0x1340/0x1340 [ 1487.123746] ? ext4_nfs_get_inode+0xe0/0xe0 [ 1487.124272] legacy_get_tree+0x105/0x220 [ 1487.124784] vfs_get_tree+0x8e/0x300 [ 1487.125239] path_mount+0x1429/0x2120 [ 1487.125708] ? strncpy_from_user+0x9e/0x470 [ 1487.126236] ? finish_automount+0xa90/0xa90 [ 1487.126761] ? getname_flags.part.0+0x1dd/0x4f0 [ 1487.127336] __x64_sys_mount+0x282/0x300 [ 1487.127830] ? copy_mnt_ns+0xa00/0xa00 [ 1487.128313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1487.128967] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1487.129600] do_syscall_64+0x33/0x40 [ 1487.130052] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1487.130680] RIP: 0033:0x7fc6f5aa704a [ 1487.131137] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1487.134062] RSP: 002b:00007fc6f301afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1487.135113] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fc6f5aa704a [ 1487.136104] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fc6f301b000 [ 1487.138032] RBP: 00007fc6f301b040 R08: 00007fc6f301b040 R09: 0000000020000000 [ 1487.139027] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1487.140020] R13: 0000000020000100 R14: 00007fc6f301b000 R15: 0000000020000040 [ 1487.191234] EXT4-fs (loop6): Can't read superblock on 2nd try 07:55:11 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x4, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:55:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:55:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x40000000) 07:55:11 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0x0, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:55:11 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:11 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1261, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:55:11 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) [ 1487.983785] EXT4-fs (loop6): Can't read superblock on 2nd try 07:55:26 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1261, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:55:26 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:26 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0x0, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:55:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x80040000) 07:55:26 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x5, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:55:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1262, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:55:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:55:26 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, 0x0, 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:55:26 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x8, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1502.264897] EXT4-fs (loop6): Can't read superblock on 2nd try 07:55:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:55:26 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1262, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:55:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x807f0000) 07:55:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1263, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:55:26 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:26 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, 0x0, 0x8c400, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:55:26 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1503.209867] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1503.235952] EXT4-fs (loop6): Can't read superblock on 2nd try 07:55:41 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x1e, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:55:41 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:55:41 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x0, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:41 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1264, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:55:41 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1263, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:55:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff) 07:55:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:55:41 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) 07:55:41 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x21, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:55:41 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1265, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1517.678135] EXT4-fs (loop6): Can't read superblock on 2nd try 07:55:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:55:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0020000) 07:55:42 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1264, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:55:42 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) 07:55:42 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x0, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:42 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1518.811909] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1518.837206] EXT4-fs (loop6): Can't read superblock on 2nd try 07:55:58 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x22, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:55:58 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x0, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:58 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1265, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:55:58 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:55:58 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1267, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:55:58 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) 07:55:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:55:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff) [ 1534.530645] EXT4-fs (loop6): Can't read superblock on 2nd try 07:55:58 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1267, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:55:58 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x23, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:55:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:55:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffff8c) 07:55:58 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1268, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:55:58 executing program 0: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400004) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) openat$cdrom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) 07:55:59 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:55:59 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:55:59 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x26, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1535.486110] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1535.601011] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:16 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1268, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:16 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0xbf, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:56:16 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xfffffff6) 07:56:16 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1269, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:56:16 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:16 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:56:16 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1551.977251] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xc0ff7f0000) 07:56:16 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1274, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:56:16 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1269, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:16 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1552.263191] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1552.290841] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:31 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:56:31 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:31 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1274, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:31 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:31 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x4, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:56:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff000) 07:56:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:56:31 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1276, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1566.962029] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1566.982923] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:31 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x5, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:56:31 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1276, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:56:31 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1277, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:56:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7f8000000000) 07:56:31 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1567.280264] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1567.300324] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:31 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x8, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:56:31 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1277, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:56:45 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1278, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:45 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x1e, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:56:45 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:45 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:56:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffc0000000) 07:56:45 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:45 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1278, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:56:46 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x21, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1581.733020] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1581.803284] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:56:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffe00000) 07:56:46 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1279, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:46 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:46 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:56:46 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x1279, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:56:46 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:56:46 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x22, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1582.671862] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:47 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127a, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1582.732147] EXT4-fs (loop6): Can't read superblock on 2nd try 07:56:47 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127a, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:56:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x7fffffefe000) 07:57:01 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127b, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:57:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127b, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:57:01 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:01 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:57:01 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:01 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x23, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:57:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0ffff7f0000) 07:57:01 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x26, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1597.488778] EXT4-fs (loop6): Can't read superblock on 2nd try 07:57:01 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127c, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1597.519960] EXT4-fs (loop6): Can't read superblock on 2nd try 07:57:01 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:57:01 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127c, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:57:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8000000000000) 07:57:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:57:01 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1597.963116] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1598.013514] EXT4-fs (loop6): Can't read superblock on 2nd try 07:57:16 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:16 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:57:16 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127d, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:57:16 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0xbf, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:57:16 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127d, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:57:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x10000000000000) 07:57:16 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:57:16 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:16 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1612.206068] EXT4-fs (loop6): Can't read superblock on 2nd try 07:57:16 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127e, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:57:30 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:57:30 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127e, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:57:30 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127f, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:57:30 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x4, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:57:30 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:30 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:30 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x20000000000000) 07:57:31 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x5, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1626.944390] EXT4-fs (loop6): Can't read superblock on 2nd try 07:57:31 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2201, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:57:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xe0efffff7f0000) 07:57:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:57:31 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x127f, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:57:31 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:57:31 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:31 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:31 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x8, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:57:32 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2202, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1627.879026] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1627.914297] EXT4-fs (loop6): Can't read superblock on 2nd try 07:57:46 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2201, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:57:46 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2203, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:57:46 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:46 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x1e, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:57:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:57:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf0ffffff0f0000) 07:57:46 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:57:46 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1642.257095] EXT4-fs (loop6): Can't read superblock on 2nd try 07:57:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x100000000000000) 07:57:46 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2272, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:57:46 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x21, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:57:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:57:46 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2202, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:57:46 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:57:46 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:57:46 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1642.708728] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1642.738957] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:01 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x22, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:01 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:58:01 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) 07:58:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:01 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2275, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:58:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x200000000000000) 07:58:01 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2203, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:58:02 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:58:02 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x23, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:02 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2282, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1657.875453] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1657.947200] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:02 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2272, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:58:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x300000000000000) 07:58:02 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:58:02 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:58:02 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) 07:58:02 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x26, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:02 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2284, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:58:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400000000000000) 07:58:02 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0xbf, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1658.554860] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1658.575783] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:17 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2275, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:58:17 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:58:17 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:17 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) 07:58:17 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:58:17 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2285, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:58:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x500000000000000) 07:58:17 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:17 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x4, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1673.058534] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1673.106160] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:31 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:58:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x600000000000000) 07:58:31 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x410, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:31 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2282, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:58:31 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x4b47, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:58:31 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:58:31 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:58:31 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x4b49, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1687.525869] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:31 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x8, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:31 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2284, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1687.569545] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x700000000000000) 07:58:32 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:58:32 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:58:32 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:58:32 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x1e, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:32 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x2285, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:58:32 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5309, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1688.530777] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1688.568741] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x900000000000000) [ 1689.407860] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1689.457008] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xb00000000000000) 07:58:47 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x21, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:58:47 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:58:47 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:58:47 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:58:47 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x530c, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:58:47 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x4b47, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:58:48 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x22, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1703.757643] EXT4-fs (loop6): Can't read superblock on 2nd try 07:58:48 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:58:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2000000000000000) 07:58:48 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x530f, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:58:48 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x4b49, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:58:48 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:58:48 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:58:48 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1704.788348] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1704.843236] EXT4-fs (loop6): Can't read superblock on 2nd try 07:59:03 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x23, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:59:03 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:03 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:59:03 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:59:03 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5309, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x2f00000000000000) 07:59:03 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:59:03 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5310, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:59:04 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x26, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1719.828688] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1719.901512] EXT4-fs (loop6): Can't read superblock on 2nd try 07:59:04 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x530c, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:04 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5311, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:59:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x4000000000000000) 07:59:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:04 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:59:04 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:59:04 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1720.778338] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1720.835841] EXT4-fs (loop6): Can't read superblock on 2nd try 07:59:20 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0xbf, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:59:20 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5312, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:59:20 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:59:20 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:59:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8004000000000000) 07:59:20 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:59:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:20 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x530f, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:20 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1736.359067] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1736.402204] EXT4-fs (loop6): Can't read superblock on 2nd try 07:59:20 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5310, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:20 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5319, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:59:20 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:59:20 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x8cffffff00000000) 07:59:20 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:59:20 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1737.066853] EXT4-fs (loop6): Can't read superblock on 2nd try [ 1737.162041] EXT4-fs (loop6): Can't read superblock on 2nd try 07:59:36 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x4}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:59:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf002000000000000) 07:59:36 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r1}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:59:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:36 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5320, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:59:36 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5311, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:36 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:59:36 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1752.582250] EXT4-fs (loop6): Can't read superblock on 2nd try 07:59:36 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x5}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:59:36 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5321, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1752.633986] EXT4-fs (loop6): Can't read superblock on 2nd try 07:59:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1004, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xf6ffffff00000000) 07:59:37 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5312, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1752.875909] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 07:59:51 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x8}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 07:59:51 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:59:51 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r1}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:59:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffff00000000) 07:59:51 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:59:51 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5323, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:59:51 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5319, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:51 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x1e}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1767.164447] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1767.200048] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 07:59:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 07:59:51 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5320, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:51 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5325, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 07:59:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0xffffffffffffffff) 07:59:51 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 07:59:51 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r1}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 07:59:51 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 07:59:52 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x21}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1768.077820] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 07:59:52 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5321, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 07:59:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1768.137150] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:08 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5326, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:00:08 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:00:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, &(0x7f00000000c0)=0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_SCRUB_CANCEL(r3, 0x941c, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xc8, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}]}, @TIPC_NLA_NODE={0x60, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "d918e98950f8a4ade0e06c1049c25e006cbc752f70e34dcb52980da60133"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x8005}, 0x4000000) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\"!\t', @ANYRESOCT=r0], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:00:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1af7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:08 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x22}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:00:08 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5323, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:08 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:00:08 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1784.237536] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:08 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x23}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:00:08 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5325, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1784.274064] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:08 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5327, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:00:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) bind(r0, &(0x7f00000001c0)=@can, 0x80) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) syz_io_uring_setup(0x1081, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0xe, &(0x7f00000001c0)=@in}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r6, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) syz_io_uring_submit(r3, 0x0, &(0x7f0000000400)=@IORING_OP_TEE={0x21, 0x1, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffad9, 0xc, 0x0, {0x0, 0x0, r6}}, 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="32f9fe0ffb42f4f1c8c87287389ba85b11b7b536784a564ebbca518ecfb2f21003ddd69c2609a003bdfc7ee2ff18a321972830f5f394ee34347234f5cf423d726ddaef9f5839afd222ba11dd4c2f423fee4a135a230d9d42f67cd39437e8d354cc4c3f4fe15d918a1dbb590827bed400488f8c8b47d12bf100000000"], 0xb) close(r0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2d00000000000000000005000001100003800c000280ef00010021000000"], 0x24}, 0x1, 0x0, 0x0, 0x2400c000}, 0x8c1) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x400, 0x1000, 0x1ae, 0x2, 0xb7a6}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f00000002c0)=0x400, 0x4) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) fsetxattr$security_selinux(r7, &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:ptmx_t:s0\x00', 0x1c, 0x1) 08:00:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:08 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:00:08 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:00:08 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1784.816506] audit: type=1400 audit(1730188809.135:243): avc: denied { relabelto } for pid=31620 comm="syz-executor.3" name="NETLINK" dev="sockfs" ino=33513 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=netlink_tcpdiag_socket permissive=1 [ 1784.938861] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1784.993087] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:23 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x26}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:00:23 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:00:23 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5326, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:23 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:00:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@broadcast, @in6=@ipv4={""/10, ""/2, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f00000014c0)=0xe8) sendmsg$nl_generic(r0, &(0x7f0000004d00)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x62000040}, 0xc, &(0x7f0000004cc0)={&(0x7f0000001500)={0x379c, 0x2b, 0x20, 0x70bd27, 0x25dfdbff, {0x1a}, [@typed={0x8, 0x8a, 0x0, 0x0, @u32=0x8}, @generic="7104809dc792c313fcacf03299867ebc5292e81fac036eb3a2a1f728d038c79fc4b606ca5482b3c941ea7978bfd3a28b68bbb52195202f2d24d5157d3c756541def773bb31e3701b738d6abbe701c59762851f9e21e90619f9538caf4a00f85a20333c68048d15ecb502fa6e1bbce34db9fa3c7a1fff", @typed={0x8, 0x27, 0x0, 0x0, @uid=r2}, @nested={0x23, 0x18, 0x0, 0x1, [@generic="d9b7ffd0c01b82bae6ee9502d97d795ca9874d8d0119a97cc926717922cd3f"]}, @typed={0x8, 0x3e, 0x0, 0x0, @u32=0x6}, @nested={0xf0, 0x73, 0x0, 0x1, [@typed={0xc, 0xe, 0x0, 0x0, @u64=0x8}, @generic="0a8d91242feb8d80558ef9ad9e955a36dfb6024d4090ce9fe5c63552337a076052dfadef1c960a42de46295ee69cf944f6dc29bac83f03a98e551043706df9768f1341f80660150432d129c985175b0773b7f9663b1beb4dbe053668c0394ed3773131c3f6e26133543f34af04219ddcd2c484b9cfef480488cbd96630c365a7207ec69657a5cad2e3f1c65020d3acd81e817a7699adadbe82bc3e59e5ffe8c1867ec9bdc4acda0f89777c2b44c10c1b7bad067d901cd4964f6ddd04afd8e45b5a97d74c764ebf35b16d45a4f1c42556eafec72818193d4c", @typed={0x5, 0x3e, 0x0, 0x0, @str='\x00'}]}, @nested={0x1178, 0x3, 0x0, 0x1, [@generic="000c46fbfbed56d9cc119d1a064aa0", @generic="09ef5592a2ae329abdec5de1ceb510eeb50f33bf3344afa852880329c87dc88b758b4333e77975f8642f8def52384e1dde6aa7362d9fb583b4f6de605bb5b30b5d8514094f5b97666b615db8954d5ea411e531b05f5c69d0272641cbfab821f3851df6addac4b9eb9b09f545c0a2d293ccdabef101960abd88d632385b70e771d4c093782be7ca2ffca33290d7411f4392b79451b8db89ce6d3eb0a79b6fc32afbf8218038dd72a3f36aeee530521795f68b3c148d", @typed={0x8, 0x8c, 0x0, 0x0, @pid}, @generic="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", @generic="9a3cf6e2cdff43fa73f91a46df0d9c7a2940a056e433b4fb8ee668b7c28094b184a9c3c28ffddecc9094253420f5ca45543e0853adc62485933dd8d7c868a83a7fd07bf5e1374cb43278a766aa7862e400269f742ed19838ae304536a76d735eec77435c9e48caf35718be338d3822787b95572b30cd3344ed3dc470bfdd17e7621a4dfb53d1784b69c04d7c7b72f315d27243f148a934977746a2281e44082dbd6a4f1f2b35df22"]}, @nested={0x12cb, 0x38, 0x0, 0x1, [@typed={0x4, 0x49}, @generic="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", @generic="60944e8c30fea5f23cfd2fe5e179a04d7bcdfbe21b010c79e73d612bb68f2130d96f9fe7d529dfae89c958", @generic="9bc1c607fcfb4292c8d80dd24f3e8a65ace2dc8086482406044df4c4f095182f4ee28efe1eb22b378b6cf29cbe55d29027e6468cd233c13486e97ee6e369ec6628850b139572db88e0da3a1d39a1b1142302b8b61d3c3e56b33a06c427845fe845ffb2589cf6c99e42c2b93b8a26fd79bf14373a65b71c657dca9bbd8f8b6524926d402a95abca06f678ee692bd161e51e45918823909c3333f47ae048c9f748e16e6a483194fcad95eca3969e330f9c1fa2fcd3bcf535b2e05aa910", @generic="44fd38a07cac76b2", @generic="c7834e330ea487d4019f10fd8ac693c8eccea24149ec7bfedbf9e2ab6a47ec0ba77c5d1f24df951b6f92bff3d0d694cd8b5f327634f269a3c1bb9ba8ffec344b6fd7467ca4ed3c5944ba80e54976a6bf3904b5176813440a48cee5973937c1f5d348fc0d48a1090cc8a7ee590dd81c3bd34275d8494e2d3904e853d487fa4945d48ca71ce493b7cbb9b78762156e4b643624c18bcc4c8260c3c8484e65ab9893b564c4095b57a6a4fcfafac6291f025b498edb4ed988f09fa142f2cfc9e2780efefad228cf2f6f53b219f5ffe1a83f476b7d4e6f05c6ee69fb0842100cbdaf9312a5d59862c4b5ea413a7c4ffa", @generic="7e0665618be4cf18ee759b5da3b1e25a6c1f44af78c7500e41faed822e16d9736940c9edd6221310b12ad9162a4626e91944efc13c59d3aa9d1cff23f2f8d5d13c1adf16d9f85fdbcd4bd73c07d6b85de691749bd3a9731b592b25325e707b4c74dbc4", @generic="fb60", @generic="4e139bf0cb3c68749e96163ea59f975a1695df2afef2032ede87e9ef84d9c489095b19520478356d2b676b7e07a9a4d029fe66a8d20e2d55add87f557ed2b6b3caf4de47583686624cf1782f5fe14a116d546af98c58a6f9dc39aa3a35a21bad26feb48cf5f708e4addf016f372b7476b30350cbf6f5e164bf8ef8b57a66488cd187"]}, @nested={0x11a0, 0xf, 0x0, 0x1, [@generic="8167c0f8b6573a293481a8c36843de3045ed3d94f79e082c62da4bf80752542db8c2207b7d18fcaaaad40a359039d7a5b888248fc8dd94112bd3f467a598d4bb764a5e3b", @generic="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", @generic="a880fe30324b7ee2704ad0bbbe8c27068f9031c75d27a5c7867a43b49ab72e25d8661566a9544d40d3ace7a95d58a1beb990e91d03709ebba6af5a1cc734cf76e937cb8c7b23faeb475ac6c690e2195bc7bdbaa7ef284d8deffa4288349c4d9c50bc0da10dcbbfc39e7bfa23fc5f24ea0d16d95366f1bc70fee42a508941a109742923799ea29f5d6ee4d68a01591e2881afa4886523e320b076208ce837e989336fe9618ab4e72cfba8426934b67a849e250b355f3c666c97d165dcc7993333ae4434f74c8b0bef2a8917ce4742b3776719dc32ef36a1be6c1c57b75c123e7d8006dfb1b4dec7241d", @typed={0x2c, 0x1c, 0x0, 0x0, @str='system_u:object_r:udev_helper_exec_t:s0\x00'}, @generic="aacdbc4c7e488b3748b76216ecc26adadcce7b917f065b7cf0e8e3804ba31485fcf5b7daea70d975cec878b3c90120a8b407563d1312c596b4a1ff51e9820cde18befa"]}]}, 0x379c}, 0x1, 0x0, 0x0, 0x840}, 0x44040) recvmmsg(r1, &(0x7f00000011c0)=[{{&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/65, 0x41}, {&(0x7f0000000200)=""/208, 0xd0}, {&(0x7f0000000300)=""/170, 0xaa}], 0x3}, 0x27}, {{&(0x7f00000003c0)=@caif=@dbg, 0x80, &(0x7f0000000540)=[{&(0x7f0000000440)=""/255, 0xff}], 0x1, &(0x7f0000000580)=""/14, 0xe}, 0x400}, {{&(0x7f00000005c0)=@qipcrtr, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000640)=""/18, 0x12}, {&(0x7f0000000680)=""/55, 0x37}, {&(0x7f00000006c0)=""/240, 0xf0}, {&(0x7f00000007c0)=""/172, 0xac}, {&(0x7f0000000880)=""/57, 0x39}, {&(0x7f00000008c0)=""/37, 0x25}, {&(0x7f0000000900)=""/100, 0x64}, {&(0x7f0000000980)=""/191, 0xbf}, {&(0x7f0000000a40)=""/190, 0xbe}, {&(0x7f0000000b00)=""/116, 0x74}], 0xa, &(0x7f0000000c40)=""/189, 0xbd}, 0xffff}, {{&(0x7f0000000d00)=@phonet, 0x80, &(0x7f0000001140)=[{&(0x7f0000000d80)=""/25, 0x19}, {&(0x7f0000000dc0)=""/104, 0x68}, {&(0x7f0000000e40)=""/234, 0xea}, {&(0x7f0000000f40)=""/124, 0x7c}, {&(0x7f0000000fc0)=""/112, 0x70}, {&(0x7f0000001040)=""/60, 0x3c}, {&(0x7f0000001080)=""/156, 0x9c}], 0x7}, 0x3}], 0x4, 0x0, &(0x7f00000012c0)={0x0, 0x989680}) fsetxattr$security_selinux(r1, &(0x7f0000001300), &(0x7f0000001340)='system_u:object_r:udev_helper_exec_t:s0\x00', 0x28, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:00:23 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5328, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:00:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:23 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:00:23 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xbf}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1799.610678] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:23 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5327, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:23 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5329, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1799.682960] audit: type=1400 audit(1730188824.001:244): avc: denied { relabelto } for pid=31750 comm="syz-executor.3" name="NETLINK" dev="sockfs" ino=33559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:udev_helper_exec_t:s0 tclass=netlink_netfilter_socket permissive=1 [ 1799.699169] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:24 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1799.836842] perf: interrupt took too long (21597 > 20936), lowering kernel.perf_event_max_sample_rate to 9000 [ 1799.926893] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1799.962093] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:24 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:00:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRES64=r0], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:00:38 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:00:38 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5330, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:00:38 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x1f4}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:00:38 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:00:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:38 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5328, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:38 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:00:38 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x500}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1814.578052] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8000, 0x22) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x3, 0x9, 0x76, 0xe0, 0x0, 0x5, 0x20800, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x8000, 0x152e, 0x4, 0x3, 0x80000000, 0x8, 0x5f, 0x0, 0x80000001, 0x0, 0xc1f1}, r2, 0xc, r1, 0x0) 08:00:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:39 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5331, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:00:39 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:00:39 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5329, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:39 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:00:39 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:00:39 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x1e00}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1815.130004] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:39 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5382, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:00:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="23090970fbc99c502e0a9acd9940147193f7575f8824ac581cc6d616f0d6c0f4d6c13a00d9ec78148f5cf1000b3d20aa7726e48d0c42d51cd05548b7c234e4383f95c7b6ad5dbcbf769eb1a902e42113d06d56791c97ef3e2af7cad1917ab89afe9f7a094595608eded968de45d111384b8f9f87823791fc6436e19185534edb84d6213e97c70a8b0d47796f42c7ec7100c6b02b5dd56bffff0f000016686cbb553917915f5b6d6f88b6d6f289f2447079e43104b06421b810d571f04d41aff25e8640a086adb4ff5f6aab77c8"], 0xb) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = epoll_create1(0x80000) fcntl$setpipe(r1, 0x407, 0xffff) [ 1815.160820] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:39 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5330, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:54 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x1f00}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:00:54 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x2) 08:00:54 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5331, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:54 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5386, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:00:54 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:00:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321375ffc83c6411ccb"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:00:54 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:00:54 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x2000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1830.127213] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:00:54 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5382, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:00:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:00:54 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5393, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1831.317468] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1831.363238] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200840, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') close(r0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000007c0)={{}, {0x2}, 0x1, 0x0, 0x0, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)="8c9d835ad4782363786b4a062521c905bf5010e4e7a02316bf19267241e578cb8e33287d2581cb8cbb89660c5b4c0e8f15ddf82a2c8a0bf14d57a19d1cc892183a874285e05656", 0x47, 0x0, &(0x7f0000000580)={0x2, 0x1b1, {0x0, 0xc, 0xce, "95316b916eb256d17fef922fc660bb291828bfde83d390917816122742dd2f11439f0f8cf22676330931b23fb239a8eecd3bcb29bb8aca6c760b9f9fc1ab32978b56fa1ea584990829a827b16131eadf4cce7a45cefe60bf8723caadd730b34c7a9be4943cd481dcd9a90d2967abd13d9de6c306213b5e9f4785b6a9bbd4ee1a458f652773dd8efe305f02820b6a03647c917ff3777bf2568f462d7c957aeab9c6783b1e7cc8c6e34c3f6fe91ed629bf99a6fd1b0fc68f1777caba79d9dc11cd2215c3318b619741847387bd7a01", 0xd6, "c3dc93e590f69d3eacc12eb4010f456adcf44641431e79c63d87601bcb57bf0b7927271d754b7b7d5d256940e4fc852363717696d9558a57df23325e10d2ab786806364d42a2123376add72829ced9106d313680425fda316d62a78748f7d85c3f93d40c6715f76631b3ab2a2ae8ec6021b3b99d6663a9b791a29aa784c1e0b764238b1ed3d80241b07e61e79616cc8a69c9b5b1459132b990bec7bac9c01f4039070a75091ec65f4f37cba99f44824c77e5c205b0b8ec2bfee0e5a5ff822c18b8723c288463d75a2bf93c315abd98956fd407dbd666"}, 0x76, "7ed1d63b1c4e7d36c780e339a88e0f4c1e27605b6964772a416e75f2f39f5a8cdd601bfea8b45576590d9e2c2a25154b16f36dd0d170535da6f1f54c7fd70e1d9e662279822cffab655429372def835cb6f34bf69783ba72968c1888a7b1f5362ea8687bc9ce31548cf00ff9f1aecdaeba578f7c6436"}, 0x233}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1}, 0x1, 0x2, 0x1, 0x1}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="9d3211f6c091e2df4821d4c63f400762bcdcd1332c5df1f8c13c182edcf9e88402132d1e3c70ed57a27dd089a0a26b47221393774fd6dbd1d5f7cb9223d24e46bf51f8fde541315247860fb488f0c06a90c03fcc29d83bea7495647dab2d131221ef6f2a6bafc65ec3590e78c6cdc2342f1c8ed61140a648d7d937e75c7f335a40ad0636f373081f6505dbcd100a2f96", 0x90}, {&(0x7f0000000240)="ed465aa4edde3c6c0c5023450eb731b1a2128e2640e6b8570c9e17f5e7e9d229f77b7ab20ff6fba1bcbbd45f41f0b3af2d19970797535151d31a77f28d5ae8079bdf5d5c5212047688cc66c0f28dbb54997105e1b1345fdca52ee796fa08785443180dc063db07a0dce9907420b5fb2c2e5035fcda22d1f0feaa7977eb35b2b832e57dd13ca81eed252c8e07e5003585cd973523b4337ea8a855b9bfe4b59b9f897ce736ffc33459d037a3f01ce9ee8ced8c6f9174e1f1dd725d219c76dcd77a3a47dc41a997b0cc5e985fef56c658299d2cacc35deffacb2dc8dc2ed7b12e920a57", 0xe2}], 0x2, &(0x7f0000000340)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @txtime={{0x18, 0x1, 0x3d, 0x3a}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x78}, 0x4005) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:01:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:01:11 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x541b, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:01:11 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x2) 08:01:11 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:01:11 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:01:11 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x2100}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:01:11 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5386, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1847.639911] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1847.693770] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:12 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x2200}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:01:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)=0x1) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000080), &(0x7f00000000c0)={'L-', 0x400}, 0x16, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:01:12 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5421, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:01:12 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5393, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:01:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:01:12 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:01:12 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1847.922005] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:12 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r2}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x2) 08:01:12 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x2300}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:01:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) [ 1848.186119] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:26 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5450, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:01:26 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:01:26 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:01:26 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x2600}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:01:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:01:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write(0xffffffffffffffff, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x810, r1, 0x4b966000) 08:01:26 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:01:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:01:26 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xbf00}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1862.382828] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1862.416532] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5421, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:01:26 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5451, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:01:26 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:01:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) [ 1862.658235] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1862.676625] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:40 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xf401}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:01:40 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:01:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf71a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:01:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:01:40 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:01:40 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:01:40 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5450, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:01:40 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5452, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:01:41 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x1000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1876.804781] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1876.848574] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:41 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5451, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:01:41 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:01:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:01:41 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:01:41 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5460, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:01:41 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:01:41 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:01:41 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x4000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:01:42 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5452, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1877.810154] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:42 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40049409, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1877.849499] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:01:42 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:01:42 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 1878.994451] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1879.033063] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:01:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) readahead(r0, 0x43, 0x5fa) r1 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x0, 0x1, 0x0, 0x0, 0x61f4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b8000000130001000000000000000000ffffffff000000de000000000000004a9200ff0200000b0000000000004281e08d3d39bbc100000000000a00403c0000100078630edc00b65621fb17d0b1e09eee2edf8be3afc1959d20009f9bed2002a37e7f02c65b0f07d896c57a71da807778024a5c125c2632a4f4e67e6b48cb7300000000", @ANYBLOB="c62cec93addfd0065a18a2ecbe175572f448e5b609637f08cd53cfce20978ab624907011be6f15e2b804b40be4c2a62747f0b3485bc7108d", @ANYRESOCT=r2], 0xb8}, 0x1, 0x0, 0x0, 0x90}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) ioprio_set$uid(0x3, 0x0, 0x4004) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000700)=ANY=[@ANYRES16=r1, @ANYRESOCT]) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x84) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x8e1, 0x1000002) sendfile(0xffffffffffffffff, r3, 0x0, 0x25) ioctl$RNDADDTOENTCNT(r6, 0x40045201, &(0x7f0000000040)=0x5c) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x1ed982, 0x0) 08:01:57 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x5000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:01:57 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:01:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:01:57 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5460, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:01:57 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40081271, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:01:57 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:01:57 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:01:57 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x8000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1893.673463] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1893.714813] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:02:12 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40086602, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:02:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) syz_io_uring_setup(0x1081, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0xe, &(0x7f00000001c0)=@in}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r4, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x4000, @fd=r4, 0x6c77, 0x9, 0x7, 0x2}, 0x0) 08:02:12 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x1e000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:02:12 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:02:12 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:02:12 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40049409, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:02:12 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:02:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:02:12 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x1f000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1908.454736] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:02:12 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40081271, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:02:12 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:02:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0ffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:02:12 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:02:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1/file1\x00', 0x0, 0x0, 0x0) 08:02:12 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40087602, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:02:13 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:02:13 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x20000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:02:13 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40086602, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1909.267224] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1909.307563] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:02:13 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40101283, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:02:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:02:13 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:02:13 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000000c0)={@loopback, 0x7a, r5}) r6 = dup(r1) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000080)={@local, 0x78, r8}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r8, 0x1, 0x6, @remote}, 0x10) r9 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x42, 0xa) write$binfmt_script(r9, &(0x7f0000000180)=ANY=[@ANYBLOB="69ccbbca00ba5a7c70fbe410c2f5de59d5a8a8a581e7000000000000d7674f2ef00e2ca40b3f336c323142f8cceb71d38cf6cdc301c3006593fc8c813d5d6849fcf19393fff05acbb3038030f9dfc47916f0327f116b5076a7ec62fc3a8f2327d5850346a14948cb139f14e44face60316f5d1e9c11b"], 0xb) close(r9) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1909.531110] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:02:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffd44a, 0x2) close(r0) ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, &(0x7f0000000040)={0x8, 0x800, 0x2, 0x66, 0x7, [0xfffffbff, 0x5b, 0x2, 0xd5]}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000080)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) ftruncate(r1, 0x4) 08:02:27 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40101286, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:02:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:02:27 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x21000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:02:27 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40087602, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:02:27 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:02:27 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:02:27 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:02:28 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x22000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1923.844554] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:02:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:02:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000001, 0x10, r1, 0x95934000) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="23fc91486b063fdb9b6d466977fe95e08a0900"], 0xb) r2 = syz_io_uring_setup(0x2216, &(0x7f0000000040)={0x0, 0x5d5e, 0x20, 0x3, 0x0, 0x0, r0}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000180)) r3 = dup2(r2, r0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0xe, &(0x7f00000001c0)=@in}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r5, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r6, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/stat\x00', 0x0, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000280), 0x6, 0x10480) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0xfffffffffffffff8, &(0x7f00000003c0)=[r1, r5, r6, r3, r3, r7, r8, r2], 0x8}, 0x6) r9 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x30, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x3883, &(0x7f00000002c0)={0x0, 0x726c, 0x1, 0x2, 0x16e}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000380)=0x0) syz_io_uring_submit(r9, r10, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, {0x4441}, 0x1}, 0x40000009) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:02:28 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40101288, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:02:28 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40101283, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 1924.351948] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1924.400901] audit: type=1400 audit(1730188948.719:245): avc: denied { map } for pid=35010 comm="syz-executor.3" path="pipe:[35337]" dev="pipefs" ino=35337 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 1924.429412] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:02:42 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:02:42 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:02:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffddfffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)=ANY=[@ANYBLOB="010000000100000018000000d75839e3ca5869a423a5057d4a6be0f7d4f10ffc50dabfbf7dea7f039c2772c025ece864b836eb620137f4de06af046b3728d0d98e3b57f9b3a0a803278b68b326920d13806bd5f3b61e14bb9a6b8fde07b3d5b2d50a5a9ed4d9d78d687bf2003b6c7dcadd4921c9e9d06dcdfa1f5317194658fd8d47dcdbb90f482a994b4f2cdc6ee86c538157e92e64eafcdfbc15cde3ba860caed9e0d5847b894c", @ANYRES32, @ANYBLOB="01000000000000002e2f66696c653000"]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xc03c2, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x8) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000004c0)=ANY=[@ANYRES32]) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) 08:02:42 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40101286, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:02:42 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x23000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:02:42 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401070c9, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:02:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:02:42 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:02:42 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x26000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1938.604977] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1938.636194] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1938.672178] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 08:02:43 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:02:43 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401070ca, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:02:43 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:02:43 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:02:43 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x40101288, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:02:43 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x95ffffff}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1939.108486] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:04 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xbf000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:03:04 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:03:04 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401070cd, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r2 = socket$inet(0x2, 0xa, 0x0) dup3(r2, r1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000040), &(0x7f0000000080)=0x4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:03:04 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401070c9, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:04 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:03:04 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 1960.008244] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:04 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xf4010000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:04 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401870c8, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, 0xffffffffffffffff) 08:03:04 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401070ca, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:03:04 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:03:04 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xfdffffff}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1960.253361] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:04 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) [ 1960.794466] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x40c0c2, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:03:19 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:03:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:03:19 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401070cd, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:19 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:03:19 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401870cb, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:19 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:03:19 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xfeffffff}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:19 executing program 3: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000080)) fgetxattr(r0, &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000140)=""/82, 0x52) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1], 0xb) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:03:19 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xffffff95}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 1975.115995] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 1975.164017] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:19 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401870c8, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:03:19 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401870cc, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:19 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:03:19 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:03:19 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:03:20 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xfffffffd}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) r1 = mq_open(&(0x7f0000000040)=',^)\x00', 0x2, 0x10, &(0x7f0000000080)={0x100, 0xfffffffffffffff9, 0x2, 0xa72b}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000002, 0x11, r1, 0x6f439000) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:03:20 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x4020940d, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 1976.034637] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:35 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401870cb, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:35 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:03:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200000, 0x2) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) write$P9_RLERROR(r0, &(0x7f0000000080)={0xf, 0x7, 0x2, {0x6, '::\'@$]'}}, 0xf) 08:03:35 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80041284, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:35 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:03:35 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:03:35 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xfffffffe}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:03:35 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="032109"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = signalfd4(r1, &(0x7f0000000180)={[0x2]}, 0x8, 0x80000) openat(r2, &(0x7f00000001c0)='./file1\x00', 0x180, 0x60) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) accept$unix(r0, 0x0, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd_index=0x7, 0x0, 0x0, 0x100, 0x3, 0x0, {0x0, 0x0, r4}}, 0x8001) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/module/tcp_cubic', 0x10401, 0x0) bind$bt_hci(r5, &(0x7f0000000240)={0x1f, 0x1, 0x2}, 0x6) [ 1991.352917] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:35 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80041285, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:35 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x401870cc, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:03:49 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x4020940d, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:49 executing program 3: sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x7c, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_RULES={0x4c, 0x22, 0x0, 0x1, [{0x4}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1fc}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x7}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x9}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0xa728}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xa2}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xfffffbff}]}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}]}, 0x7c}, 0x1, 0x0, 0x0, 0x48000}, 0x44041) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x35}}, './file1/file0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, 0x18, 0x109, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x4, 0x16}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x54, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x3e}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5b}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x44000) openat(r1, &(0x7f0000000080)='./file1\x00', 0x80, 0x19) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:03:49 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:03:49 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:03:49 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:03:49 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x4}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:49 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80081270, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:50 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x5}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2005.879290] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36350 comm=syz-executor.3 [ 2005.895404] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2005.917557] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=36341 comm=syz-executor.3 [ 2005.935085] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:50 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:03:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='Y(\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f5, 0x800, 0x70bd29, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004011}, 0x8004) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x20, 0x18, 0x109, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x4, 0x16}]}, 0x20}}, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x3f7, 0x200, 0x70bd2a, 0x25dfdbfb, {0x7, 0x7, './file1', './file1'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x24008801}, 0x0) 08:03:50 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:03:50 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80081272, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:03:50 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80041284, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:50 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:03:50 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:03:51 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x8}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:03:51 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80086601, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 2007.050700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=36542 comm=syz-executor.3 [ 2007.108652] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:03:51 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:03:51 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80041285, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:03:51 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 2007.155592] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:07 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:04:07 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:04:07 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80081270, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:04:07 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1e}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:04:07 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80087601, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:07 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:04:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x400840, 0x2a) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2023.024633] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:07 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x21}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:04:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="a32109"], 0xb) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x42800, 0x76) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x1000) 08:04:07 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0045878, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:07 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80081272, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2023.082394] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:07 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:04:07 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) [ 2023.744804] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2024.012753] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:22 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:22 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:04:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x32d, &(0x7f0000000040)={0x0, 0x2f97, 0x2, 0x3, 0x17c, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000180)) io_uring_enter(r1, 0x59a9, 0xb6a1, 0x0, &(0x7f00000001c0)={[0x3]}, 0x8) 08:04:22 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x22}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:04:22 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0045878, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:22 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:04:22 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:04:22 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80086601, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2038.200719] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:22 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0101282, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:37 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x80087601, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:04:37 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0189436, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:37 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:04:37 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x23}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:04:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x14000, 0x0) close(r0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, 0x0) accept$unix(r2, 0x0, &(0x7f0000000080)) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:04:37 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x0, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:04:37 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) [ 2053.016014] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:37 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x26}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2053.051530] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:37 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc020660b, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:37 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0045878, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:04:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="d7dc14616f2470f1cd6539000000"], 0xb) close(r0) copy_file_range(r0, 0x0, r0, &(0x7f0000000040)=0x5, 0xa943, 0x0) 08:04:37 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xbf}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:04:37 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x0, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 2053.264587] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:37 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0045878, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:04:37 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0481273, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x100010, r2, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:04:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:37 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:04:37 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:04:37 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1f4}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2053.460943] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:37 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0101282, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:04:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r1], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:04:37 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x2) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:37 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x500}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:04:37 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) [ 2053.693634] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2053.744989] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:52 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x0, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:04:52 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:04:52 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:04:52 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0189436, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:04:52 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1e00}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:04:52 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x3) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x1010, r0, 0x10000000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000080)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x2000000000, &(0x7f0000000040)=[r0, r0, r2], 0x3, 0x0, 0x0, {0x0, r3}}, 0x2) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:04:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:52 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1f00}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2068.090828] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:04:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:04:52 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc020660b, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:04:52 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:04:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x38) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', 0x0) r4 = syz_open_dev$vcsn(0x0, 0x4, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r2, r3, 0x1000) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x303242, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000380)={'vxcan1\x00'}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000000c0), 0x12) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0xc, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r8, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) syz_io_uring_setup(0x635c, &(0x7f0000000140)={0x0, 0x314a, 0x4, 0x2, 0x294, 0x0, r0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) [ 2068.888729] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:08 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp={0x0}, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:05:08 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:05:08 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:05:08 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0xc0481273, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:05:08 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x2000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:05:08 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x1000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:05:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f0e6bb6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321d4015218a6872609eddd3fe248a42a2e3b76b84231a6d030d76997ac5893250484a8e9b1bd01e3e14901e9090a87f156682494cb227bdbfec5f8f2a3a9369d"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r1, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0, r1) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYRES16=r2, @ANYBLOB], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x2, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xd87}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40014}, 0x40080) 08:05:08 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x2100}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2084.514091] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:08 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:08 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x12003, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000180)={0x1000, ""/4096}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x442, 0xa8) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:05:08 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2085.007543] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2085.058346] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:23 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x2000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:05:23 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp={0x0}, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:05:23 executing program 3: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc1c}}, './file1\x00'}) r1 = openat(r0, &(0x7f0000000040)='./file1\x00', 0x6c0d42, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:05:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:23 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:05:23 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x2200}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:05:23 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:05:23 executing program 0: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:05:23 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x2300}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:05:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="00f181"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=@v3={0x3000000, [{0x7, 0x3}, {0x5, 0x8}], 0xffffffffffffffff}, 0x18, 0x2) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x8000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @broadcast}}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xe8) bind$packet(r5, &(0x7f0000000340)={0x11, 0xf7, r6, 0x1, 0x1}, 0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, 0x0) openat(r2, &(0x7f0000000040)='./file1\x00', 0x400000, 0x40) 08:05:23 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2099.432384] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:23 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x3000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:05:23 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp={0x0}, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:05:23 executing program 0: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:05:23 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:05:24 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x2600}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:05:24 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2100.446644] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2100.497340] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000004, 0x2010, r0, 0x972ec000) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x100000000, 0x7, &(0x7f00000014c0)=[{&(0x7f00000000c0)="879e7aef648bf8f9f04a74317db0a288cc94d7ea228e44cdc62f2391e16428bdfc64", 0x22, 0x7f}, {&(0x7f0000000180)="4dd8e6816e5b939e5f009bb4ceb047ade06f581c419d53d89501c294317c14681935188ac69d445491b0132feacd526c6fcb49c2d2ced753eece96a7220dbfcd6ee87db3ec7153bad4a4b7e0895bba9401baf6ec03c4fa208020d3322d5a84fa069923510d032ccbe58f1d12ddc7", 0x6e, 0x5}, {&(0x7f0000000200)="3af8e376a5e13107b364b828e54f263e4b77697f6f0bff0b88e4f0ab1915d0f5a796bb7aaa70176bb367306d19914b2b976837a8df7f1c591d946f2559c66a63cef6aa5cd6be925bdb0d02e220669119f85509c2798faa57f92e26918544f135052c8caa6c95c70cf5e9801bc39731a8aa05120f7e135835b577439188c8846af5d3e67714c718da7a013b48f9b7fb446bfd6232f1f8f6ecb96d75b5cd771b3862205bd5b4c193def33bf885aa527bb57e30f3a5c0cfbf380a703f841613dd8e797bca2b2aa8d47727aff0898119a3722b98d3424e1acb7d19abc95c2f1e787f493294297a64a15c4ac84a8599368d", 0xef, 0x7dc}, {&(0x7f0000000300)="bc7d3101763b10085ff2736178f217580d2e44e45081e65d9c3b4931b30059a089d9021e9b734f44269fc1548110f6699871337a889199952ce9576d48919d87ae00974ce24bf96fc09f649731a1519a298afbbcc4f0c187c40fd68cecb095ac3f0e188008edf5349c0eee414644af82ef2fe6f3e99cf358db8e98fa2a82a8ca9346e16de25d86f816e90a29cc79af7518271483ddd0ae8689c669cac70721fdf49562209d65575fb45de4", 0xab, 0xf4}, {&(0x7f00000003c0)="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", 0x1000, 0x8}, {&(0x7f00000013c0)="3febea0542d7a79fa169870a6e6aa178eb655ae33c67de9ad815d5ce731fa34b397724e69b8ec8441a7ff9df189a688720f307ef9e9043014553768b7696988a7bbbae15ff7c3a9b608bd6f854af183d3f21dc33890298e31277ef43409a445637a92b8c577ec3fa0f2e2932ca5c18a8d1d8077168073f3f5d7b980026892f627fad6ca6ca60fba1589f11df82494123", 0x90, 0x2}, {&(0x7f0000001480)="18b8524470774361d5a111950945c828294bdbb774cd72b282c7f32dff4e4d17cc905f3000ced92c3c7380937603933a336d991e97c9ec074c", 0x39, 0x6}], 0x4000, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp437'}}, {@shortname_winnt}, {@fat=@nfs}, {@shortname_mixed}, {@shortname_lower}], [{@hash}]}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:05:39 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:05:39 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xbf00}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:05:39 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x0, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:05:39 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xdaffffff) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:05:39 executing program 0: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:05:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:39 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2115.043891] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:39 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xf5ffffff) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 2115.078011] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:39 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2115.101120] FAT-fs (loop3): Unrecognized mount option "hash" or missing value 08:05:39 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xf401}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:05:39 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x0, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 2115.141277] FAT-fs (loop3): Unrecognized mount option "hash" or missing value 08:05:39 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:39 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:05:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000300)=[{&(0x7f0000000240)=""/41, 0x29}], 0x1, 0x0, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2116.160075] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2116.232114] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) openat(r0, &(0x7f0000000000)='./file1\x00', 0x40200, 0x69) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 08:05:54 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x0, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:05:54 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x900) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:05:54 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xfdfdffff) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:05:54 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:05:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:54 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:05:54 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:05:54 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x4000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2130.512522] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:54 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xfffffdfd) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:05:54 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xd00) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2130.570143] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:05:54 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb66b0e4f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:05:54 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:05:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000004840)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000280)}}, {{&(0x7f00000002c0), 0x6e, &(0x7f00000027c0)=[{&(0x7f0000000340)=""/83, 0x53}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000480)=""/245, 0xf5}, {&(0x7f0000000580)=""/205, 0xcd}, {&(0x7f0000000680)=""/41, 0x29}, {&(0x7f00000006c0)=""/33, 0x21}, {&(0x7f0000000700)=""/190, 0xbe}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/4096, 0x1000}], 0x9, &(0x7f0000002880)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000002900), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000002980)=""/121, 0x79}, {&(0x7f0000002a00)=""/47, 0x2f}, {&(0x7f0000002a40)=""/115, 0x73}, {&(0x7f0000002ac0)=""/114, 0x72}, {&(0x7f0000002b40)=""/203, 0xcb}], 0x5, &(0x7f0000002cc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000003fc0)=[{&(0x7f0000002d00)=""/28, 0x1c}, {&(0x7f0000002d40)=""/153, 0x99}, {&(0x7f0000002e00)=""/220, 0xdc}, {&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000003f00)=""/82, 0x52}, {&(0x7f0000003f80)=""/32, 0x20}], 0x6, &(0x7f0000004040)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f00000043c0)=[{&(0x7f0000004100)=""/175, 0xaf}, {&(0x7f00000041c0)=""/231, 0xe7}, {&(0x7f00000042c0)=""/48, 0x30}, {&(0x7f0000004300)=""/155, 0x9b}], 0x4}}, {{&(0x7f0000004400)=@abs, 0x6e, &(0x7f0000004500)=[{&(0x7f0000004480)=""/59, 0x3b}, {&(0x7f00000044c0)=""/47, 0x2f}], 0x2, &(0x7f0000004540)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000004640), 0x6e, &(0x7f0000004780)=[{&(0x7f00000046c0)=""/142, 0x8e}], 0x1, &(0x7f00000047c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}], 0x7, 0x0, &(0x7f0000004a00)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@private0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) 08:05:55 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x0, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:05:55 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2131.347944] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2131.389567] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:10 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xe00) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:10 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:06:10 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x5000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:06:10 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x0, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:06:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x42, 0xfc) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) openat(r0, &(0x7f0000000040)='./file1\x00', 0x200600, 0x120) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:06:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:06:10 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:06:10 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xffffffda) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:06:10 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x8000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2146.325767] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:10 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xfffffff5) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:06:10 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x2000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x3, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000180)="2305083f4547b2719f344928a0e409e0151ab9b11e60fdd51a74efe835dff10f457160a55c6ce656d9979b21e45f2e36bd7ac6d0906f42370d5fa204c083c14e85d4b86b4c58dd5ba7f686eea81f54590d884df2c1932e9ade70f2c85cda9292134da6115950d1dfcc41b5f5824a607b5cbf150a9f509c07c3b17d0401990da285ab0edad0bf41f2784ded356f33de19d9351f842df0614b38fbdb5011af876cf34eb47ed1cd40634680b16b491205589498f49fbb05742d4cdb706f621ef9c5e09a4332b0deb2ca17919883ce4c0a8aa799389d7bf1d1c04f9c3d094a19805714fe4a21523b5eda70", 0xe9, 0x6}, {&(0x7f0000000280)="535905c6d90bb840cbaffe0ba6bc4c974d638c4d5c2ee2b64c91771a3a0047acb8b747e2b80777b397fdf24ae86cd25d5660c6cd501373eca3cca718a3e901b7830324eeb98ad3e94cc7f6cf33e892635363f7bd3ebc70bcccc28f329b331b50c02c8f83620fe2112895fb0a6cb33b1a63a76a6eceba7a18872ec2c0427cdbc2587553db4e849d12fd2a2b05f58fd510e615a6b375cfec94a28832a24ab71ebad1c095e70abfc06d186b", 0xaa, 0x3}], 0x4c0, &(0x7f0000000340)={[], [{@smackfshat={'smackfshat', 0x3d, '$}'}}, {@dont_appraise}, {@uid_lt={'uid<', 0xee01}}, {@dont_measure}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r0, 0x0, &(0x7f00000003c0)='./file1\x00', 0xc0, 0x100, 0x23456}, 0x86) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r0, 0x4d9f8000) 08:06:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:06:10 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x0, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:06:10 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:06:10 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2147.205096] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:25 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1e000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:06:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf71a0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:06:25 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x0, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:06:25 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:06:25 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x20000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="f71daba16a210000000000000000"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:06:25 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:06:25 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x100000000000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 2161.609323] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2161.632805] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:06:25 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1f000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:06:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x4000010, r0, 0xcd459000) execveat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) 08:06:26 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x200000000000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:06:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x1000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:26 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x0, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 2161.907872] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:26 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:06:26 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x20000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:06:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:06:40 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:06:40 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x21000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:06:40 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:06:40 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x2000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:40 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x300000000000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:06:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r4, 0x1, 0x6, @remote}, 0x10) r5 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r6, 0x0) statx(0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000500)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000840)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r7}}, {@posixacl}, {@access_any}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, r8}}, {@version_9p2000}], [{@fowner_eq={'fowner', 0x3d, r9}}, {@dont_hash}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfshat={'smackfshat', 0x3d, '\',\'A'}}, {@seclabel}, {@pcr={'pcr', 0x3d, 0x33}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@appraise}]}}) setgroups(0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8]) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r5, {r6, r8}}, './file1\x00'}) 08:06:40 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x0, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 2176.202948] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:40 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x22000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:06:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0xc) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 2176.232945] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:40 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xdaffffff00000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:06:40 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:06:40 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x3000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:40 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x0, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:06:40 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:06:40 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2176.617474] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:55 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x23000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:06:55 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x9000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:55 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x0, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:06:55 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x0, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:06:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x14000, 0xb7) write$binfmt_script(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000051252f06c9186145c50c322dbdd9da4d6cf05d1e50e1c0c27053cf84b253a9ad383402e602f16dd7ce39b1a3df70f7bef6ff417fea3ae2ff1ef9aa821ed7ceaebd13bd2f015b4d132cc1abfa4426758f5f31c6bcccface2c35262df55a7a5c19cf6c97ac1fec88f64b5a6fc457333d29aa3a052ef3177e79067b92c1c0e8400cedc9e98418a08e6c9fe22508cad66621affeac2c16d39cf8a25b5919806393dbe94c560e1c1c9797c66250451a343d86364048"], 0xb) close(r0) setxattr$incfs_size(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)=0x1, 0x8, 0x2) r1 = syz_io_uring_setup(0x6f1e, &(0x7f00000001c0)={0x0, 0xec32, 0x1, 0x2, 0x103}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000240)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000280)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd_index=0x7, 0x465, 0x0, 0x2, 0x5, 0x1}, 0x7) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) r4 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r4, 0x5322, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = dup(r5) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000080)={@local, 0x78, r8}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r8, 0x1, 0x6, @remote}, 0x10) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x12, r4, 0x8000000) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000001, 0x10, r1, 0x0) syz_io_uring_submit(r9, r2, &(0x7f0000000480)=@IORING_OP_STATX={0x15, 0x4, 0x0, r3, &(0x7f0000000340), &(0x7f0000000440)='./file0\x00', 0x10, 0x1000}, 0xff) 08:06:55 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xf5ffffff00000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:06:55 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x0, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:06:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:06:55 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x26000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2191.380211] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:06:55 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xd000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:06:55 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) [ 2191.863814] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:07:09 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x95ffffff}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:07:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:09 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xe000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:09 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x0, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:09 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x0, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:09 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x0, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:07:09 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xfdfdffff00000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:07:10 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xbf000000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2205.982819] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:10 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x20000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:10 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xffffffff00000000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:07:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="232115"], 0xb) close(r0) syz_io_uring_setup(0x1081, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0xe, &(0x7f00000001c0)=@in}, 0x0) syz_io_uring_setup(0x1081, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0xe, &(0x7f00000001c0)=@in}, 0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x19, 0x1}, 0x101) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:07:10 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0x0, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:10 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x0, r5}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:07:10 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x0, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:11 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xf4010000}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:07:11 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) pread64(r0, &(0x7f0000000000)=""/111, 0x6f, 0x3) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:07:11 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xdaffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2207.205447] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2207.258611] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff083f25388fdf6c13265d2dfec5bd51cec3f7c5bfbe91a252bb7bf90000000000000000"], 0xb) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000180)={@local, 0x5c, r4}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, 0x0) execveat(r2, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:07:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) [ 2207.811845] scsi_io_completion_action: 2 callbacks suppressed [ 2207.811881] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 2207.813855] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 2207.814685] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 2207.815481] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 2207.816423] print_req_error: 397 callbacks suppressed [ 2207.816436] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 2207.861964] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 2207.866352] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 2207.867210] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 2207.867990] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 2207.877854] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 8 prio class 0 [ 2207.879079] buffer_io_error: 478 callbacks suppressed [ 2207.879087] Buffer I/O error on dev sr0, logical block 0, async page read [ 2207.880558] Buffer I/O error on dev sr0, logical block 1, async page read [ 2207.881428] Buffer I/O error on dev sr0, logical block 2, async page read [ 2207.882292] Buffer I/O error on dev sr0, logical block 3, async page read [ 2207.883121] Buffer I/O error on dev sr0, logical block 4, async page read [ 2207.883970] Buffer I/O error on dev sr0, logical block 5, async page read [ 2207.884817] Buffer I/O error on dev sr0, logical block 6, async page read [ 2207.885693] Buffer I/O error on dev sr0, logical block 7, async page read [ 2207.933348] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2207.934023] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2207.935925] Buffer I/O error on dev sr0, logical block 0, async page read [ 2207.944193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2207.945000] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2207.946449] Buffer I/O error on dev sr0, logical block 1, async page read [ 2207.948234] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2207.949020] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2207.950593] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2207.952689] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2208.010299] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 2208.011681] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 2208.013118] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 2208.014035] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 01 00 00 01 00 [ 2208.014965] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 4 prio class 0 [ 2208.061049] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2208.097994] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:26 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0x0, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:26 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffe000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="f6e82f8dc6d41fe4ff5232c593be0451bc9c6f40409aaded83414bc7b8d0716a81a7e5e4aaeec5c80e2437be24f11e30b8daef359909f7aa4ac319ad15823cf8514d2d48684d8e358c129ff3f860f980c08516b2c3506c8ea61c321a5fac1256b556a43a"], 0xb) close(r0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8916, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r7, 0x40044900, 0x8f13) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, 0x0) execveat(r3, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x100) 08:07:26 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xfdffffff}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:07:26 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:07:26 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:26 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ftruncate(r1, 0x3) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:07:26 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xf5ffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:27 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xfeffffff}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2222.894130] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:27 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x5, 0x2) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000990d73b76ede05a9d02a496dad705b4f0c12f7c268b6835491b61e45f66f5e2e52ed125b60fd4882fd885876d253a630dbeaefb2c4dad925140f82aec7bc5057ce0e4bbb30d6cf7667ce67d6c257023d6171e3eb95cc3957f446fdf6b51bb5d66cd105a029ae70730588a3de80fcdf72c467973d7e4ca593ecadd65dc4c339b707a2a6f81e25003d462e225a8a66788a23e729a75c07d35fa92b1edb5e499bb58ba2369463ebfdc5518c83a200fb087782f6f60f9f07ece60da7f63fc7b9573aba9058751683b3a6ab9ebb299ef88c0f4c4f06f9b8f03819788be050150ca3f31b", @ANYRES32=r0, @ANYBLOB="09000000fdffffff2e2f66696c653000"]) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) [ 2222.974245] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x206042, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:07:27 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffbff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:27 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xfdfdffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:27 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0x0, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:27 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:27 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2223.803288] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:42 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xffffff95}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:07:42 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:07:42 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x0, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:42 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xfffffdfd) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:42 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x4030c1, 0x0) accept$packet(r6, &(0x7f0000000280), &(0x7f00000002c0)=0x14) r7 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r7, 0x5322, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_add_memb(r7, 0x107, 0x1, 0x0, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c05000000b24d3de3a8b366d13386c3bf41117c729b7535b8dcfdc1ae08e6313abd4618482c7dae59d88c0632ef6ba43dab339d54cb0a46b3848ed8ef2d92db1a7d2ef38f13e6244770858764a3f03be6adc09f8b3a406b47a94c339bec72cb00"/109, @ANYRES16=0x0, @ANYBLOB="00042bbd7000fedbdf250900000008000b0000000100"], 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0xc000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 08:07:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1, 0x2}}, './file1\x00'}) execveat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x800) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x6) sendfile(r2, r1, 0x0, 0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r3, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) fcntl$dupfd(r3, 0x406, r1) 08:07:42 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:42 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xfffffffd}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2238.058829] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:42 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:42 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xffffffda) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:42 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:42 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x0, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:42 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="dc43338000"], 0xb) syz_io_uring_setup(0x1081, &(0x7f0000000300), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000b9b000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0xe, &(0x7f00000001c0)=@in}, 0x0) syz_io_uring_setup(0x1081, &(0x7f0000000280), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000800000/0x800000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0xe, &(0x7f00000001c0)=@in}, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r7}}, 0x5b317ff) close(r0) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) r9 = dup(r8) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r9, 0x8936, &(0x7f0000000080)={@local, 0x78, r11}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r11, 0x1, 0x6, @remote}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f0000000080)={'ip6_vti0\x00', r11, 0x29, 0x7, 0x40, 0x0, 0x69, @local, @local, 0x10, 0x40, 0x101, 0xffffffff}}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:07:42 executing program 1: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50102}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="201d2e8120329bbd6dda178f503600", @ANYRES16=r1, @ANYBLOB="01000000000000000000110000000c0001800800fe00", @ANYRES32=r3, @ANYBLOB], 0x20}}, 0x0) gettid() r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3}, 0xe) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r5, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:07:42 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2238.794010] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:58 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xfffffffe}, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:07:58 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0xc0b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @remote}, 0x10) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000040)={0x0, @can={0x1d, r6}, @rc={0x1f, @any, 0xaf}, @nfc={0x27, 0x1, 0x2, 0x5}, 0x7, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)='bond_slave_1\x00', 0x40000, 0x4, 0x3ff}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:07:58 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:07:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:58 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xfffffff5) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x100) 08:07:58 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:58 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x0, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:58 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2253.907667] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:07:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:07:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) preadv(r0, &(0x7f0000001180)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000000040)=""/135, 0x87}], 0x2, 0x0, 0x3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:07:58 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x2000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:07:58 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:07:58 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:07:58 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:07:58 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x1, 0x800, 0xbf81, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$packet_add_memb(r1, 0x107, 0x1, 0x0, 0x37) [ 2254.575278] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:08:13 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x4}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:08:13 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:08:13 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:08:13 executing program 1: write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0xe0800, 0x0) write$binfmt_elf64(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x9cd) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x5, 0x67, 0x0, 0x7fff, 0x2, 0x3e, 0x5, 0x260, 0x40, 0x38d, 0x7ff, 0x9, 0x38, 0x1, 0x3fcc, 0xf2, 0xf}, [{0x2, 0x7, 0x1, 0x80, 0x1ff, 0x0, 0x8c}, {0x60000000, 0x8, 0x400000, 0x1, 0x5, 0x0, 0x2, 0x8}], "007a730f01afe829f67568b308e427036fbc6d7deb72393da5708fecdd05050d70cf36836a1f0498f7a799b729d4905b9cb05e97554906d52041bf5e7a4b8ff521a46f9bda54a7d5e4"}, 0xf9) fallocate(0xffffffffffffffff, 0x2, 0x1, 0x4) 08:08:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:08:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x0, 0x0, 0x800) 08:08:13 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x100000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:08:13 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:08:13 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0xd, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008081}, 0x40) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:08:13 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x5}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2269.245193] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2269.263510] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:08:13 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x200000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:08:13 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xb) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file1\x00', 0x180100, 0x61) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$sg(0x0, 0x0, 0x2001) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f00000004c0)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f00000008c0)={r3, 0x5, 0x80000001}) r4 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000100)={@rand_addr=0x64010102, @local, @dev={0xac, 0x14, 0x14, 0x16}}, 0xc) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f00000000c0)={{r1}, {@val={r3}, @max}}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee00}}, './file1\x00'}) 08:08:13 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:08:13 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:08:13 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:08:13 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:08:13 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x8}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:08:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_names\x00') close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 08:08:13 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x300000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2270.006871] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:08:28 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:08:28 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:08:28 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8982, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0), 0x1, 0x80) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18}, './file0\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0xa2affe2ddaf3df41, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x2) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x400000, 0x47d416ae2a71fc8e) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r2 = syz_open_dev$hiddev(&(0x7f0000000000), 0x100000001, 0x507000) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) pwrite64(r2, &(0x7f0000000040)="c1eeaf2e16cb417e2f6dca600b34ef269919c9632fdd62bcfee4796dd3c26ee713086a362c5014182965bae550d0ff6127de01b2f1c8e2bd14de675f73b672781c61f1dcd5cccee469fee088ce94c7d472eae973ad34cb1cd5675f3b58bbdc8677bf4f678d27303b9e437bd72d63bf8af42ea51f98621979ccb728457695", 0x7e, 0x8) 08:08:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) dup3(r1, r2, 0x0) 08:08:28 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:08:28 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x1e}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:08:28 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x900000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:08:28 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2284.656516] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:08:44 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x21}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:08:44 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:08:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:08:44 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:08:44 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x9, 0x101000) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000040)="2a5f6e15df76ffd405c80139e3ba07bef398364e319c39fcfcc9c55e82c0cd2662ad8ea34e8bfbb7443e0dd73bb62b975d7bd40cd9d812d305c59811b6c7f96d28daaa7a42919f64bbd4e9221e1de49d1074af8bc7e7674b15dd3bfe39ef7c7d61dbb9d5097e5f5ff31a56c02897e8867103bed403", 0x75}, {&(0x7f00000000c0)="a4d3db06ec045d26e5fef37e15ebc34b33d0a957f6ace33d0177e0", 0x1b}, {&(0x7f0000000100)="189b8749afe092f39cb6ca6b117fc4ac34754fc5cc4ba218f0ae6bdf05772a0187a6bd0781fcda3a9ba140b2c24257859470c52bef85a0afc0bf6f432dae076c791f2b29c1a111030d4b05c5f7354c133606955ebfd862d8254e43dc5854d031164433a0", 0x64}, {&(0x7f0000000180)="393835a2965e9fb0d57aea0c5ec32df32f9354d85a3dd1d1dd5b7942d88a7021f7c271f41fe84b675b02f3e14c99c4bfaa9eced95375706162696317b7f57f4f57181d743247a2f142d7f35cd45a5fe528b2e2e0d50e769718f8fea01490c6a896dc34049e9bdfc6652be2224240fa892e1d229dfa3dd24ed53587a46ab067d94c4abe11745f7afca214f41d745f9ab849eef6962a3c836413b5854da32df97af2d4f2b74eacaee4135003739562f6348fdb02b6d3adf006c356e9730ea5cbdf9a59c5832bd96b57cc69c0ba183bb84b", 0xd0}, {&(0x7f0000000280)="af723c19ab275c2c0f51f4903103f10ff68a03377359db0cd78f8772f5589e2189490bda497abfee03c920895bdd63b0b044609efa42373162ac5b8e8a80496b1750516ac6b6a117f08011025de72d3b", 0x50}, {&(0x7f0000000300)="6ddb765217fcaf6d9c917034cd46e39497d21257e706d657dc7076111626ea92733e2847519468096cc9d6cb98b0d264edae10ee2a829aa1f0d9719ddc424eebedec97edfdc7a14e7480af54cfcc3bedcc7cff6227abe7a0c3bb565480d02b9e8c5e4a8d7ac6b242eb1e05e4a73ae58138520f761abab5851662b1b717d041a57e140477715a37c64c175f8fe56767d973964b5e65e0ae949be6b10d3ddd70a8b66e65224a03cacfce63c820cac94200dc0ad8e80e93961f28bda9aae44ea2f151046e7290fcb8a8ea3d1441f386d7a8289c8cf4635687", 0xd7}], 0x6) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:08:44 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xd00000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:08:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000340)='./file1\x00', &(0x7f0000000500)={{r1, r2/1000+60000}, {0x77359400}}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, 0x0) execveat(r4, &(0x7f0000000040)='./file1\x00', &(0x7f0000000300)=[&(0x7f0000000080)='(\x00', &(0x7f00000000c0)='&7\b', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='*#-\xa4\\\'\xd5[\x00', &(0x7f0000000200)='@\x00', &(0x7f0000000240)='[,\x00', &(0x7f0000000280)='}@\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000480)=[&(0x7f0000000540)=']{V:%&:]}\x00\xe0\xa4Lj\r/J\xf6\xa9\x85\xaf\xc1b\x1c\xe1\xe7R+\x94(]k\xc5\x93<\x15s\xe4\xb8\x80/\x9b0U.\xf9\xba\xf1s:\xd3\x9c\x14C\xd88>\x14\xd1 \x00\v\xb91\x02;\x00h\xf3n\xd9\xd2}\xb7<\xa1\f\xce Va\x8d\xef\x1c\x19Aii\x9dp\xd6\xecR9\x81n\xa2\x1dR\xd5\xcd\xeez\xce,~\x96q\xd9-t\xb8T\xcd\xe0\xcf\xa1\xd9n\x06\x8e(\xd1R\xad&\x03', &(0x7f0000000380)=',\x89`\xa6>#]\x00', &(0x7f00000003c0)='*-[![(^V!:/.\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00'], 0x100) 08:08:44 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:08:45 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x22}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2300.810474] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:08:45 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000002c0)={0x0, 0x2ef0, 0x29c, 0x3f, 0x1f, "c473edacf7ac42dd84ef6122ae4bf696b476cf", 0x8, 0x7}) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x1cc}, 0x1, 0x0, 0x0, 0x40000}, 0x4040804) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:08:45 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r2, 0x2) dup2(r1, r0) [ 2300.900197] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:08:45 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xe00000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:08:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:08:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r1, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x100) 08:08:45 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x23}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:08:45 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:08:45 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:08:45 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8916, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r5, 0x5322, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = dup(r6) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000080)={@local, 0x78, r9}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000040)={r9, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r9, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3e}}, 0x10) 08:08:45 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x2000000000000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) [ 2301.403756] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:08:45 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) [ 2302.118929] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) [ 2302.137596] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:09:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#!\t'], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) mknodat(r1, &(0x7f0000000040)='./file1\x00', 0x40, 0x9be) 08:09:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:09:02 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:09:02 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:09:02 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:09:02 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0x26}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:09:02 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_OPENAT2={0x1c, 0x3, 0x0, r1, &(0x7f0000000040)={0x260002, 0x102, 0x2}, &(0x7f0000000080)='./file0\x00', 0x18, 0x0, 0x12345}, 0x4) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) 08:09:02 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xdaffffff00000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:09:02 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {0xbf}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) [ 2317.946995] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:09:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000080)="00000000000000000000000039c043d453c3e431fcb325122ef6970341999833e8e9", 0x22, 0x4e0}], 0x0, &(0x7f0000000040)) 08:09:02 executing program 0: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0x0, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x7, 0x7, 0xf7, 0x0, 0x5, 0x20000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x54, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x200, 0x3ff, 0x4, 0x5, 0x8, 0x7fffffff, 0x1, 0x0, 0x101, 0x0, 0x9}, 0x0, 0x4, r0, 0x2) 08:09:02 executing program 4: r0 = fork() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2252, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x0, 0xfffffffffffffffd, 0xffdffffd}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x20, 0x20, 0x0, 0xffffffffffffffff, 0x100, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x4, @perf_bp, 0x0, 0x7c2, 0x5, 0x5, 0x1, 0xffec, 0x4, 0x0, 0x200}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00~(\x87P\x16}\x0e\x80\x1c\xadP:\x116\a\f\x16\xc7\r9cs\'C\x02\xd4\x16\b\xb5\xc6\xaaF\xedQ\b\x82\x82\xf1\xec\x96n0\a\x9c\x97\xdd\xd2\x95v\xe5\xcf\xa5\x87\xed\x9e\xc1\xaa[N\xc9[\xe3\x05R\x9ds`\xc0\xbbd\xc4_t;\xa1\xfb\xe3\x9a03\xe7<\xe4\x93{@\xa9\x06\x00\x94A\xe70gO\xae\n\xac\xc3\xebz\xb5\"\xb7\x18\x01\xf5\xd0\xf9\xa4z/\x90\x14\xcfv\x1f\xe0\x82Z\xa9\xf2\xf8\xa3\x00\x00\x00\x00\xfc`\xd0\x86R\xb9\x03\xd8\x8c\x92\xb6\xd7E!P\xb8\xb1\xa6\x9c\x02.\x03Ls\r\xb6\xd8f\xa7\x0f\x9b\x87e\x15.\xbe\xacb\b\x00\x00\x00\x82|\x94\x10\xdaU', 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x0) fallocate(r1, 0x0, 0x0, 0x400004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r2, &(0x7f0000000100)="df1031eefa40616d51d36ce95bef5cc0", 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000200)) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) r4 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000400), 0x8c400, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000440)={0x0, @aes256, 0x0, @desc1}) ioctl$CDROM_SELECT_SPEED(r3, 0x5322, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:09:02 executing program 7: ioctl$HIDIOCGUCODE(0xffffffffffffffff, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x0, 0xa0, 0x225a, 0x9}) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r2, 0x5322, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000040)={r5, 0x1, 0x6, @remote}, 0x10) perf_event_open(0x0, 0x0, 0x4, r2, 0x2) dup2(r1, r0) 08:09:02 executing program 5: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0xf5ffffff00000000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 08:09:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000280)=0xe8) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140), 0x1000490, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap}, {@cache_loose}, {@afid={'afid', 0x3d, 0x3}}, {@loose}], [{@subj_type={'subj_type', 0x3d, '/dev/usb/hiddev#\x00'}}, {@measure}, {@euid_lt={'euid<', r1}}, {@smackfshat={'smackfshat', 0x3d, '$!('}}]}}) r2 = syz_open_dev$hiddev(&(0x7f0000000080), 0x9, 0x10000) dup3(r2, r0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="4ec826ba47931d87ae40b65030b2ef5897215434401fe7"], 0xb) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', 0x0, 0x0, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000380), 0x80) io_submit(0x0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000003c0)="963d25433a62fcaec158602b9f286f3ebbb5fd48c65565114b745d7bed2d95382376194f6f6038d0b39fdf17c1e410ee6baf72c83c45e5d83dd34434bb25f1f540253c841bdb718b68bea0d1c7fb4ba094e479eea34fd764260befb5df345fc4a8df1157a5769f86fdb42490956314bf87e501a3951611e88d55986b45ad74007b0926900577e8598428ca4f62b9d08e179da8ba2d7e7afbfc2fdfe5df9c3a79d6dd", 0xa2, 0x8, 0x0, 0x2}]) [ 2318.311198] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) 08:09:02 executing program 2: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="fd9d0fd7a6d0fe", 0x7}], 0x1}}], 0x1, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xffffffffffffff94, 0x0}}], 0x200002dc) 08:09:02 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x6eaa01, 0x0) ioctl$CDROM_SELECT_SPEED(r0, 0x5322, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ioctl$CDROMRESUME(r0, 0x5302) [ 2318.449768] EXT4-fs (loop6): fragment/cluster size (65536) != block size (4096) VM DIAGNOSIS: 08:14:12 Registers: info registers vcpu 0 RAX=ffffffff83e7b910 RBX=0000000000000000 RCX=ffffffff83e634ec RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7bf18 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85677708 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7b91e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc00b3ba010 CR3=000000000d204000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004180c224c0000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e7b910 RBX=0000000000000001 RCX=ffffffff83e634ec RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e7bf18 RBP=ffffed100112f000 RSP=ffff888008987e70 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85677708 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e7b91e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe4f00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000c007ab5068 CR3=000000000d204000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=009302fe016c6c6f502e726567616e61 XMM02=61746f7420636578650a0a0100010101 XMM03=65786509006e6567206365786508006c XMM04=69727420636578650b007a7a75662063 XMM05=696d696e696d20636578650d00656761 XMM06=0a006873616d7320636578650a00657a XMM07=63657865110073746e69682063657865 XMM08=6e6567206365786508006c61746f7420 XMM09=6578650b007a7a756620636578650900 XMM10=6d20636578650d006567616972742063 XMM11=6d7320636578650a00657a696d696e69 XMM12=0073746e696820636578650a00687361 XMM13=72617473657220726f74756365786511 XMM14=616469646e616320636578650e007374 XMM15=0000736465657320636578650a006574