00'}) 01:09:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x5421, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:06 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2576.736744] kauditd_printk_skb: 87 callbacks suppressed [ 2576.736762] audit: type=1326 audit(1713661746.143:17030): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.744553] audit: type=1326 audit(1713661746.143:17031): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.748121] blktrace: Concurrent blktraces are not allowed on loop8 [ 2576.754189] audit: type=1326 audit(1713661746.144:17032): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.767638] audit: type=1326 audit(1713661746.144:17033): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.785422] audit: type=1326 audit(1713661746.144:17034): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.797505] audit: type=1326 audit(1713661746.144:17035): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.813210] audit: type=1326 audit(1713661746.144:17036): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.825924] audit: type=1326 audit(1713661746.144:17037): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:09:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x5452, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2576.849541] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2576.849541] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2576.849541] 01:09:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@local, 0x5c}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x4f, 0x7f, 0x0, 0x7, 0x5530, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x401, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffa}, 0x4a100, 0xbf3, 0x4, 0x3, 0x2, 0x3ff, 0x9, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2576.856426] audit: type=1326 audit(1713661746.144:17038): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:09:06 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x891e, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2576.869921] audit: type=1326 audit(1713661746.151:17039): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14277 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2576.904448] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 01:09:06 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='ntfs\x00', 0x1a4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x54) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x3025d361577a22, 0x0) sendmsg$unix(r0, &(0x7f00000003c0)={&(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)="4b60c5cf0e5f48bc7d6cd98bfdf011099c947f143422d9066f42af293629019c29e88ccce1056b8584325f4f8621e1d653f1aef0115c82c68ef39b2d3c30d9b748ec7bf59d511a472a1bd10f1c67f7f80a4302fd0e9aa3b950effc76fc0bad2352427f22d6873c42c2ba0e8672c713e851ef637f78ae7674b28309e3b84a06fcf3a46478d556f666ef421838a56b756f190cc822812ea60060a923", 0x9b}], 0x1, 0x0, 0x0, 0x4080}, 0x4004) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:09:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'ipvlan0\x00'}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000040)={'lo\x00'}) 01:09:06 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2577.036780] blktrace: Concurrent blktraces are not allowed on loop8 [ 2577.158220] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2577.158220] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2577.158220] [ 2577.171598] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue 01:09:22 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000000) read(r2, &(0x7f00000000c0)=""/9, 0x9) 01:09:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8923, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:09:22 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000000) read(r2, &(0x7f00000000c0)=""/9, 0x9) 01:09:22 executing program 7: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000240), 0x125001, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'vlan0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/rtc', 0x4800, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000000280)=ANY=[@ANYBLOB="015d89be8dd07d9a13980644", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x3, 0x4, 0x0, 0x25800000000000, 0x0, 0x1, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f00000003c0)) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:09:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x5460, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x4000000) write(r0, &(0x7f0000000080)="85e4b372bbecf2b3b264b4a19c2a6f8c0367d86f25f7f3e2602fbd0a4eaece3dc260b7716d1bf2d80c6b98952294d7d2f1ec772f820067018a99975e58227837edb06eda11c98c75251250cd1f4dfcda25d096f3bb6e89da99b9f86572ed07dd7e9599a76f1d734ec6d4c6c999a6b34ed66c03f6c03b661c5a147597e8faf1fe00b4dd", 0x83) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:09:22 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:09:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'veth1_vlan\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f0000001e00)={0x567, 0x200, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2592.998316] kauditd_printk_skb: 74 callbacks suppressed [ 2592.998327] audit: type=1326 audit(1713661762.405:17114): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.008106] audit: type=1326 audit(1713661762.411:17115): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.011877] audit: type=1326 audit(1713661762.411:17116): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.017708] audit: type=1326 audit(1713661762.411:17117): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.026153] audit: type=1326 audit(1713661762.411:17118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.029215] audit: type=1326 audit(1713661762.412:17119): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.046206] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2593.046206] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2593.046206] [ 2593.050425] audit: type=1326 audit(1713661762.412:17120): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.057880] audit: type=1326 audit(1713661762.412:17121): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.062947] audit: type=1326 audit(1713661762.412:17122): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2593.067270] audit: type=1326 audit(1713661762.412:17123): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14331 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:09:22 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8923, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:09:22 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1ed02a, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)="c3483470aba0f513a3c094dd70259a5337abc9bc4a33bc80b1f885e555cda0fa4502ccb6ba3fddc0c39e95fbea3ed85e3b13347a43f23212fbfc51", 0x3b, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2593.078399] blktrace: Concurrent blktraces are not allowed on loop8 [ 2593.079582] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 2593.100998] blktrace: Concurrent blktraces are not allowed on loop8 01:09:22 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:09:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x40049409, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:22 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext, 0x7225, 0x0, 0x400, 0x6, 0x0, 0x4000742, 0xfffd}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ftruncate(r0, 0x8435) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x2, 0x5, 0x9, 0x0, 0x40, 0x400, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x48, 0x1, @perf_config_ext={0x4, 0x8}, 0x81, 0x92, 0x20, 0x1, 0x2, 0x8, 0x20, 0x0, 0x3f, 0x0, 0x88f}, r1, 0xd, r3, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:09:22 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) quotactl(0x5, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000240)="c81cb9a7627a26aba31c4d6c0580dc7b76e9972bb8b1ccbd7fb599dc5e298ffb8a55231bfec2885e0569a29425217eaa19bbcd361f60e5f648b0b219e2e2ec3d01ae55937daa8fd7f0b3c0e54e6f35865326f5239346ed7942447209a245557809703d17ed442bb035af759e9e8fc50798711feb77da040a77bbd06deca0eb42fddab6b22065fbab6fc3e1082aae0915826ec09506e090434d7c1d3cc92ae8e255f66ed83fbbb2f415c8c90dbf57c363f606b7869f94b2defd83332706e58802fe44e70d79fc67ba3b82f45cd8156cd596ac7f7b3659f135ba76742a05bfa1fdf1827ab739a8e6c14a926b1bde495407f4e13dd6891c") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2608.198804] kauditd_printk_skb: 85 callbacks suppressed [ 2608.198816] audit: type=1326 audit(1713661777.605:17209): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.201452] audit: type=1326 audit(1713661777.606:17210): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.220990] audit: type=1326 audit(1713661777.612:17211): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.223220] audit: type=1326 audit(1713661777.628:17212): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.224013] blktrace: Concurrent blktraces are not allowed on loop8 [ 2608.226524] audit: type=1326 audit(1713661777.628:17213): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.229575] audit: type=1326 audit(1713661777.634:17214): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.235791] audit: type=1326 audit(1713661777.634:17215): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:09:37 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000000) read(r2, &(0x7f00000000c0)=""/9, 0x9) 01:09:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0300000000000000a5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:09:37 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) read(r2, &(0x7f00000000c0)=""/9, 0x9) 01:09:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x1ed02a, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setxattr$incfs_metadata(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240), &(0x7f0000000280)="c3483470aba0f513a3c094dd70259a5337abc9bc4a33bc80b1f885e555cda0fa4502ccb6ba3fddc0c39e95fbea3ed85e3b13347a43f23212fbfc51", 0x3b, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:09:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4019c423, 0xfffffffc, 0x8, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:09:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x40081271, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:37 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:09:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) ftruncate(r1, 0xb68) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2608.240897] audit: type=1326 audit(1713661777.634:17216): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.246096] audit: type=1326 audit(1713661777.639:17217): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2608.251849] blktrace: Concurrent blktraces are not allowed on loop8 [ 2608.259721] audit: type=1326 audit(1713661777.639:17218): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14382 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:09:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:09:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@private0}}, &(0x7f0000001880)=0xe8) syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffa, 0x9, &(0x7f0000001680)=[{&(0x7f0000000100), 0x0, 0x4}, {&(0x7f0000000180)="1e557e7e25e77f6e1a8cf559f9938d2649e408955f49d07712107587234d75fd5155dfaeb2d361ee1960e534a0fb0b253d7ab776a89b1e2c7fa0162fb0014489a6a712a2e379b28bbf", 0x49, 0x88}, {&(0x7f0000000280)="291039f47389452a0f7c6d88b948a27dcc3d46db261dd48153ab69e533cced078984ed107e13995be282e59aea7df5384ac82b03092dd766c7e338966f380991d5ede24785708c2046c40800545e6097edc92cbadbfa1bc13e916a06f87c3e20e410c8b51bf6c0cf6a7c578a24ff2cd280781a32a84c5dc7e26bb38c8bdcc0c1b99532f0ab3a1fcfa8fc55cccb0cd813e9a300508f9c476a91ca2fd63d1cf8b0af21333bc01753e958fb5660a2ca5c1f63fcf740c82a19ade63d9158706cbaaaa97f676f516407b7cc201e778c03762e38f6dcfcdbd711d2", 0xd8, 0x9}, {&(0x7f0000000380)="318329c7f77ee4726e09cef5e4d149dc3b978b8faf808577253d3adb6c35618b43534a3aaa1534c6bdf1926a16238cad8b7e0c1e25a1d9ba484471e08a0238e22a4fb29bc394a9e8a9", 0x49, 0x8}, {&(0x7f0000000440)="360834b5ca6754965978670315c8a700fb570924cb1330d384c088575497f82df9d59196e2466a43aefa4b5f578dd0dda4aedc9b7eebf41f29379101ed1d159cef72274168835874a5797deb9596cb32b62cf071793309e787948895a73a97cf2cf7e4b3f3a4ef92702f2cb5c04b516e1f3cd523aa0cc9bd151fd6cb1a379f5c9f5b22f2d2616fef68f82fcdcb8f5aa80de05e13753c78576351ccc8b8786f3a10cc729c5af57b29f977083b2eac01ed1f52243a1de2bce023276caec185a159a69166036648df8ca7a7b5ca9197d212b055800f7dabdb5a2a0a5f1563b653b70ac17831b91930c0bc16ea25f83c6d70b621de56ef", 0xf5, 0x20}, {&(0x7f0000000540)="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", 0x1000, 0xffff}, {&(0x7f0000001540)="d6c83b22eb9986ba100941d49e838c6d98bd0e51422404d1dc30bde8100432a8bc7fb7c9494d2ce52fd303b8e0882a0ced3d9977c4aaf1a805c27b715d88a9cef893bb49594b69e119d9917840dc75e139b03639c90416068895e6383451168e79bb5c8e2640947c7eff8641a3ed252dcc33e3870ab72cd2264aecf6b310494d8e84aeb3f66c28c895cf60671c36690c", 0x90, 0x800}, {&(0x7f0000001600)="3bc0906db5c760b36de12c5f16fa35e17dce037d79760afca6b58dbfae85ec4332ff9a1d0332a09cc21ac4fff366b4f61bb82d8e61e545f8762cf692e7d93355", 0x40, 0xfff}, {&(0x7f0000001640)="40378dcd8d31c40b9b55bb1a6cff50c40966a4b97bc8e45e45dd9104cc7cc34f99fe285c78440667129944f17b628d5f0c799f51763aea", 0x37, 0x70}], 0x440020, &(0x7f00000018c0)={[{@fat=@codepage={'codepage', 0x3d, '1255'}}, {@fat=@errors_continue}, {@dots}, {@nodots}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}, {@subj_user={'subj_user', 0x3d, '}\':*^^.'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x28}}, {@uid_gt={'uid>', r1}}, {@pcr={'pcr', 0x3d, 0x31}}, {@dont_appraise}]}) 01:09:37 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0xff, 0x8, 0x3, 0x0, 0x0, 0x0, 0x10, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x20, 0x101, 0x7, 0x3, 0x67000000000000, 0x8000, 0x3, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x1, r1, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000010000002e0c40ae", @ANYRES32=r0, @ANYBLOB='G\x00\x00\x00\x00\x00\x00\x00./file0\x00']) bind$packet(r8, &(0x7f0000000240)={0x11, 0xf6, r6, 0x1, 0x20, 0x6, @remote}, 0x14) 01:09:37 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x40081271, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:37 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2608.387153] blktrace: Concurrent blktraces are not allowed on loop8 01:09:37 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fallocate(r0, 0x2, 0x20, 0x9) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2608.423490] blktrace: Concurrent blktraces are not allowed on loop8 01:09:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x40087602, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:52 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = inotify_init1(0x0) read(r2, &(0x7f00000000c0)=""/9, 0x9) 01:09:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = syz_io_uring_setup(0x2a7b, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000140)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r6}}, 0x73) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1, {0x0, r6}}, 0x6) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000000)) 01:09:52 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000000) 01:09:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x40086602, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x4020940d, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:09:52 executing program 4: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0xa100, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r0, 0xd) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:09:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:09:52 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2622.713000] kauditd_printk_skb: 89 callbacks suppressed [ 2622.713018] audit: type=1326 audit(1713661792.119:17308): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.719408] audit: type=1326 audit(1713661792.120:17309): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.727833] audit: type=1326 audit(1713661792.120:17310): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.740879] audit: type=1326 audit(1713661792.120:17311): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.750198] blktrace: Concurrent blktraces are not allowed on loop8 [ 2622.763042] audit: type=1326 audit(1713661792.133:17312): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.777009] audit: type=1326 audit(1713661792.133:17313): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:09:52 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) 01:09:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x80081270, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2622.800860] audit: type=1326 audit(1713661792.133:17314): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.811556] blktrace: Concurrent blktraces are not allowed on loop8 01:09:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fallocate(r0, 0x2, 0x20, 0x9) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2622.824767] audit: type=1326 audit(1713661792.133:17315): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.840323] audit: type=1326 audit(1713661792.134:17316): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2622.857966] audit: type=1326 audit(1713661792.135:17317): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14442 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:09:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f666965300057b6d84dc870092c61bd6cc19bd1037600"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:09:52 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:09:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000000) kcmp(0x0, 0x0, 0x3, r0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:09:52 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) inotify_init1(0x0) 01:09:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x84000, 0x40) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) setsockopt(r5, 0x8, 0x9, &(0x7f0000000240)="ed8ea7da47ca3ffd6d629a71b2ac806901faa5a45cb6383cf7b6150b15636ac6c21e2b4ed3717a1e5ef6a8a0c560c3570b42d641c29fd8e3363ba621f4c8cce1b0d09dc60285b62648b3f41f811eba6e7c0812d652af1b80086102ac63aab7a40f472b58db50f92c1d54250a24e9660cad9c9e2b839fe136da7254daa9d3f06eb18a7ebd475fae713c7381ad", 0x8c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2622.985851] blktrace: Concurrent blktraces are not allowed on loop8 [ 2623.008156] blktrace: Concurrent blktraces are not allowed on loop8 01:10:05 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) 01:10:05 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 01:10:05 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x1c0e, 0x9, 0x0, 0x200}) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'ip6tnl0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x80081272, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:10:05 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:10:05 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="050000008000000000000000", @ANYRESDEC=r1, @ANYRES16=r3]) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xff}}, './file0/file0\x00'}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:10:05 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2635.910582] kauditd_printk_skb: 71 callbacks suppressed [ 2635.910597] audit: type=1326 audit(1713661805.317:17389): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2635.912951] audit: type=1326 audit(1713661805.318:17390): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2635.922354] audit: type=1326 audit(1713661805.318:17391): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2635.928396] blktrace: Concurrent blktraces are not allowed on loop8 [ 2635.933171] audit: type=1326 audit(1713661805.329:17392): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:10:05 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) [ 2635.941527] audit: type=1326 audit(1713661805.331:17393): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2635.951096] blktrace: Concurrent blktraces are not allowed on loop8 [ 2635.951986] audit: type=1326 audit(1713661805.331:17394): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2635.962126] audit: type=1326 audit(1713661805.332:17395): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2635.968936] audit: type=1326 audit(1713661805.332:17396): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2635.979992] audit: type=1326 audit(1713661805.332:17397): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:10:05 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) [ 2635.992694] audit: type=1326 audit(1713661805.333:17398): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:10:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:05 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:10:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:10:05 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x84000, 0x40) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) setsockopt(r5, 0x8, 0x9, &(0x7f0000000240)="ed8ea7da47ca3ffd6d629a71b2ac806901faa5a45cb6383cf7b6150b15636ac6c21e2b4ed3717a1e5ef6a8a0c560c3570b42d641c29fd8e3363ba621f4c8cce1b0d09dc60285b62648b3f41f811eba6e7c0812d652af1b80086102ac63aab7a40f472b58db50f92c1d54250a24e9660cad9c9e2b839fe136da7254daa9d3f06eb18a7ebd475fae713c7381ad", 0x8c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:05 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) 01:10:05 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r8 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) r9 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x47, 0x7, 0x20, 0x2, 0x0, 0xf03e, 0x21816, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x2}, 0x40010, 0x9, 0x7ff, 0x3, 0x848, 0x3, 0x40, 0x0, 0x401, 0x0, 0x4a74}, 0xffffffffffffffff, 0x7, r7, 0x2) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) io_submit(0x0, 0xa, &(0x7f0000000e00)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x8, r8, &(0x7f00000002c0)="93f073c3e8438d687d93dbbc8e3345715b8e6685e63d79ea46577e58577bfb19b2346269ef089a87335147b7c8e7b86516a9a6567bc804e1dafbf0a03a9ed537af97ae83de3337f31e4f201271b0f4e356aacb45315fd5ca9e40799b330ea9226e2ce2d0e158b0d8b711122078dfe855923238d0064621b368dd8b2cf46c30c4d02198b7380629596a5d2ee8fe1b26197941c77e45c304192a2800520651963bd4b80162cae1d0e8", 0xa8, 0xffff, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x9, 0xffffffffffffffff, &(0x7f0000000380)="7ac395e044e494b8b01cb353415b4e10797cf8d300c53348a7406b9aa0513a855199036583f8536887da110ddaaee130059e5d8115082c938697489d618f2ecdb9ba739826150356c018fa00da9477a96d921bf4fa1778ccb49dc6b9dc", 0x5d, 0x1}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000540)="d4cea80842bbf160f4c98420349fd08effa3b003ee03c63485b7db8918dd3d9f2e9d5c470cd3accc99e73aca44bf62ec790c7a390eaa428c335e885554452995c0d800dd7946cb8255501eeaba1a65ae3ea1d5f6f5df81a7b0cd0c6cb94c520046964ccd384f812dd6fab899dd82da9d7398d534a7d597e5f0ca80d2bd554baefc2e4db67c3790a025f512a345486d0389f936d54e8436788f72626b42ab9f14570fbe50d50293a5710ad08722322b36637058cedfbaa61f0e7ee08f58196240f843d0d050c1b1c41176099538cb4f716e28455b3a61c18741106566d90692b924c8af7602628fe70359059c7e2b67ff", 0xf0, 0x9f, 0x0, 0x2}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x2, 0x20, 0xffffffffffffffff, &(0x7f00000006c0)="59c1880aaecf4d0e1aae47274415b43e54a5c60e9363bca62f8376f402e3ef3f5f93d18b226f35ce5c558dce3336add971fd376a5017b3958681e94c2290a20052ae0d3d65e3fcc0636c7b3e86f4c99870e2e873de45de98e182e70dc7de856bc337fae49a4ef4b441970453e5fe28baf9202bbdd09763db56638bd23233d74357c2a000c0a4a46e0a597871019a393c502aa614e6c91a4989fa61f194ba29d0847f671c47ff6023c4da5a020102c5e873a9e1cb2a91b761b84cd5a6e76a375fffba6202423dc478ec437edd8277054f1783557cf1e00b853a94afedc8939594eaf88423f6eaf516a94988855795b919ead24978fcbc94d1", 0xf8, 0xaa9}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x5, 0x3, r9, &(0x7f0000000800)="bea33dffd3fd1a05890dfdad08c984c3b06fb4a3ab93d372efe31097bf8fe8a3bb8638dea6ac70d6db76ce45443efde44d7dc04b2e0b847c1b0ccde71be8a7702f1febc2cf84af898a7171bf61baa9c834e8006ca1282c8dc30d992defc31cf6a5824e04bda037ff6f5046ed630d51c439d50efc68550dd14bdc2df748d6588a95398a2b36c74d49356b9ee0234c766a403f9b9ea73a01bdb3c9ba54b6a07d78f09627469cada0161cf731fab6cdbe37296c88d4", 0xb4, 0x400, 0x0, 0x2}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x8, 0xf1, r4, &(0x7f0000000900)="19479e52bd8dffaae1ef2b0a598ea0e86fa2b8ec0491a26eb63e6b6c457192d21bfd70b22f51e6f2eed467b57a87fdd3cadff3693e1784c878bd277d40f951258982d3d6aa7e23c5ab80947e068378ac7e285fe34a72ebd36acc9e884d9bd2e85f9980d647b474a1677de563c019653c22e67e7970f9a2862daeddaa8ccfd9016d849c0fceaeac87f2c9bf0b7ed0327b2e206caa5ed51676c910b1cb0e8b621d077a26afbeb8dda7dafe9c537f3952539adec279d0050d51a139253429576dfe1418f158164eec61c3ac246a", 0xcc, 0x7}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x7, 0x6, r1, &(0x7f0000000a40)="eb82e2e55c9696fbefea0190ce566255568c8fcb9ed6ecfe651d900c200f0ad9d62a383ba8dc2321ab7bdbc09055a48725cbc9d0759fbe0befe8c71a44e8c98b4f5d83e99219da8abc7f09f8e8b173e8ba491a589bc8e86aed9a5db419b1d5aae790006b5658b9200314d166bcd5f969737e5be54d90bbf86ec25e301633d761d16f6175c16dd97cf256240b4f4de114a996d7ee5bfb3788a9664af4f631489a69f7e09797c7aa046fee426a7575ea5c4160ddae3d1002e3ce45da143db1bb1d84df4dfbfd57434acc1f631ef73b23628c4850c1ff2103c2a644", 0xda, 0x2a, 0x0, 0x2}, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x7, 0x5, r1, &(0x7f0000000b80)="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", 0xfd, 0xd, 0x0, 0x2}, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x7f, 0xffffffffffffffff, &(0x7f0000000cc0)="47a643affe650710cb9a2bc5d614018d68bc719bf20865a59135589f468a9bb5553b33da1f3aa1adfb92670da18522130a370605ea7bebdfe2aa52945dcc3ef2dced9f5a2b4c105353539ef5f140132cb3b8714bab42c79228217e4da277bd7b8c4114f8885a3a02e2b7dc6a675c3338049259888dfbf282b7240391a7046f5ee37102a8222fbb59", 0x88, 0x3, 0x0, 0x1}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x98, r0, &(0x7f0000001e00)="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", 0x1000, 0x10000, 0x0, 0x3, r7}]) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:10:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x80087601, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:05 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) 01:10:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2002048, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='vfat\x00', 0xe0020, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:05 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:10:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0x80086601, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:18 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) r2 = inotify_init1(0x0) read(r2, &(0x7f00000000c0)=""/9, 0x9) 01:10:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/mem', 0x323802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x10002, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0xffffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) syz_mount_image$nfs(&(0x7f0000000180), &(0x7f0000000a00)='./file0\x00', 0x0, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="a99666b8f15f1ea10ef7adf8f8eff383ca94c269e86657188761601d414e5bfe945568c9e0f4c967f5850233f8bc4d4119705d082f0df9ca96c25bee89830a44a4618854ab9131e269f45b74072a958bd0b009cc7bd9de793e93b1322f0894a37a21643563013e7ebb9f51f4db8abe785afca31ffd00e69145ac62e8e96cf9de86a25490d5d38d045cc73875a81171e18a5a154c92679075e60e74f326630cddff01a7c9", 0xa4, 0x968}], 0x2028888, &(0x7f0000000b40)=ANY=[@ANYBLOB="002c002c5b2c4000282c2c6c6f002c6c6f002c646f6e745f61707072616973652c66736d616769633d3078303030303030303030303030303030382c66736e616d653d002c6673636f6e746578743d726f6f122c636f6e746578743d756e636f6e66696e65645f752c666f776e65723e", @ANYRESDEC, @ANYBLOB]) perf_event_open(&(0x7f0000000c00)={0x1, 0x80, 0x4, 0x0, 0x0, 0x3, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x4, 0x8, 0x80}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f00000001c0)=@sco}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000009c0)=@IORING_OP_WRITEV={0x2, 0x1, 0x2007, @fd=r2, 0x5, &(0x7f0000000900)=[{&(0x7f0000000240)="72967bc95c02a71963c04d7cf0cee00edc8accd99446ec75ac3b760fbaa7c3dd52a308cc27119eef06f5af45c4a4ddd8a64af49aee488bbed58914f41a8bd5080b1e2c77f9e6e981ff56c70b6dd217034ed870cb657f333122982685375a6758d769b9d23ad4d1d71f74accd1d602b2626ecc892e393689768142f20de5438dd94111934186edd0a4b368e53937a096fa309a3", 0x93}, {&(0x7f0000000300)="3037885e5eb656b0708e3010c7e09505b933f1e281ce1ea0f149307a19c89ae298fc75ef5921a23ee2317739f04e032c0460ee00f691e8fa759349a904e84aa7b1ba1cd1ec12d3eb6a194bb2ff4b60d2dfc1826ff9659c27f42d1bdd209e9117fe75fc7861419db7ea9eda6b115e77dbb69dced61deba945d55e18f5e2a77cf13c2e63f9d90c24b313f6bb99b41451627b453db1", 0x94}, {&(0x7f00000003c0)="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", 0xfc}, {&(0x7f0000000000)="4cbbd3eb58938a24e8554c791439731c91b8eef06cba4c4a2343", 0x1a}, {&(0x7f0000000540)="7876f6831c463d25d8a2d3f3a205a591203e737c12c171585409f46c8a48326751699ab0b5d08684a20d62156250bf019a99d7a7aeec932374fb8ae595c45d187ff658420c327afb7317ef75fd2aca68e7883f544061023c88a559ac8ec659005bfd11b9db73db2ceeb5a9be51d502acaa07b1c7578122365747cd418bd6869ee5ff26356e027fdf41318ad07ebb4ff6c9c7b2d7420a2f1a29e1bc6c3b472585717cfaeb91b3", 0xa6}, {&(0x7f0000000600)="4190b9e712026fd1707103022fa9b9236013c597efbd55faf7fdc9f4f24db32214c04a43912da42311cb3767508de6366902c69a7f18daeaaf3da10bd1c423c3c9d780bc4e8f46453f9705b6d41f9e57deeaf7c816cee90d9f104486e50acd8d59de6122b8a9fa07ba14ae6dbb21a836361aafaa3fd47caf0ce7b85171d9663bfb85e6a9b9ab2c405e8d4ec3ab8b1f39b75ec590a78d7024eb95fffe532defc4160cd8914b970a1e6a17229dae35e7dee972d26ff0b443c88df06c52023b41d5f388877b36ca46aa3dd1d363d6490ffabd2b84d118f98cc9", 0xd8}, {&(0x7f0000000700)="07d7ed52992b3ea298afa73732822d800a1f81fce06ea3f6c55d8fe31a92330bcd60665c79ee8701c6e5db162958416a78e5311dd31760339afc9784e93e60994ecfcc1e4b8f1a122cc228ef5ecf3ad921e76aed5a602ae432252cd577a51bf8d2705f3a8a33c73fa0e96141415c378131900780e2e880b1facdc2496198d1387e5f309f1c17bda7c33c8ef8c836a2b961bfee56f3f5047319d6829823003f32c41b013ba7d0cc39d98433f2d055a22633cc30baf313061a591f12d8ef5baa49", 0xc0}, {&(0x7f00000007c0)="1fa95e", 0x3}, {&(0x7f0000000800)="0abcc7e4417c4deeeec0e83b0e3a4f8613", 0x11}, {&(0x7f0000000840)="14ed3368dad40e8ab1dd14d71582d5813b09032ec35a8f4ac95f13d0ad9d1bb045ed87a4e95aec1c5cd38dd590199326a053a0ad9afa614e2311d366f5c8262d8ac439b3851bf414cfe4a02190c5766c5ae6736dd09cee02d39a16c820e537143b111ddd54121fd37cd6b1099ca8418c9b05b81a7006246619d1a6e8b3610dee85", 0x81}], 0xa, 0x1d, 0x1, {0x1}}, 0x20) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x410, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:10:18 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:10:18 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 01:10:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000000) kcmp(0x0, 0x0, 0x3, r0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:10:18 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x7, @empty, 0x5}, 0x1c) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f00000000c0)=0x7fffffff) perf_event_open(&(0x7f0000001d80)={0x4, 0xcc, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x10142, 0x0, 0x0, 0x2, 0x400000, 0x1000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000000) r3 = inotify_init1(0x0) r4 = inotify_add_watch(r3, &(0x7f0000000040)='.\x00', 0x2000003) inotify_rm_watch(r3, r4) inotify_rm_watch(0xffffffffffffffff, r4) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2648.769074] kauditd_printk_skb: 88 callbacks suppressed [ 2648.769094] audit: type=1326 audit(1713661818.176:17487): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.779077] audit: type=1326 audit(1713661818.181:17488): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.792030] audit: type=1326 audit(1713661818.181:17489): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.820273] audit: type=1326 audit(1713661818.181:17490): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:10:18 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) [ 2648.832195] audit: type=1326 audit(1713661818.185:17491): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.843819] audit: type=1326 audit(1713661818.193:17492): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.850438] audit: type=1326 audit(1713661818.193:17493): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.862730] audit: type=1326 audit(1713661818.194:17494): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.868111] audit: type=1326 audit(1713661818.194:17495): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2648.885957] audit: type=1326 audit(1713661818.194:17496): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14556 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:10:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0045878, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:18 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) 01:10:18 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) umount2(&(0x7f0000000000)='./file0\x00', 0x6) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2648.979285] blktrace: Concurrent blktraces are not allowed on loop8 01:10:18 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') pread64(r0, &(0x7f0000000080)=""/110, 0x6e, 0xffc00) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000000)=0x3) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:18 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2648.998287] blktrace: Concurrent blktraces are not allowed on loop8 01:10:18 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) ftruncate(r1, 0xb68) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:18 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) [ 2649.133135] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2649.133135] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2649.133135] [ 2649.162023] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2649.167403] EXT4-fs (loop5): get root inode failed [ 2649.168303] EXT4-fs (loop5): mount failed 01:10:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0189436, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:32 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x1, 0x0, @fd_index, 0x3, 0x100000001, 0x2, 0x4, 0x0, {0x3, r1}}, 0x6) r2 = inotify_init1(0x0) read(r2, &(0x7f00000000c0)=""/9, 0x9) 01:10:32 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:10:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:10:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x7f, 0x4, 0x7e, 0x0, 0xfffffffffffffffb, 0xd7, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x22ed, 0x6, 0x7, 0x7, 0x1, 0x2, 0x3ff, 0x0, 0x7, 0x0, 0x40}, 0x0, 0x4, r3, 0x1) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:10:32 executing program 1: mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) 01:10:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x222a00, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x40680, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:32 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2663.525728] kauditd_printk_skb: 67 callbacks suppressed [ 2663.525749] audit: type=1326 audit(1713661832.932:17564): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.531975] audit: type=1326 audit(1713661832.932:17565): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.546804] audit: type=1326 audit(1713661832.933:17566): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.565704] audit: type=1326 audit(1713661832.933:17567): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.572096] blktrace: Concurrent blktraces are not allowed on loop8 [ 2663.578096] audit: type=1326 audit(1713661832.938:17568): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.590640] audit: type=1326 audit(1713661832.938:17569): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.595128] blktrace: Concurrent blktraces are not allowed on loop8 [ 2663.620024] audit: type=1326 audit(1713661832.938:17570): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.622356] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2663.622356] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2663.622356] 01:10:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc020660b, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2663.647039] audit: type=1326 audit(1713661832.938:17571): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.652074] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated 01:10:33 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) [ 2663.662038] audit: type=1326 audit(1713661832.941:17572): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2663.679598] EXT4-fs (loop5): get root inode failed [ 2663.680985] EXT4-fs (loop5): mount failed [ 2663.690367] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2663.690367] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2663.690367] [ 2663.693168] audit: type=1326 audit(1713661832.941:17573): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14608 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:10:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66030000000000000063c870092c61bd6cc19bd1fe75"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2663.763199] blktrace: Concurrent blktraces are not allowed on loop8 [ 2663.776510] blktrace: Concurrent blktraces are not allowed on loop8 [ 2663.796992] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2663.802176] EXT4-fs (loop0): get root inode failed [ 2663.803101] EXT4-fs (loop0): mount failed 01:10:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:10:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/../file0\x00', 0x2020, 0xa6) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:10:47 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) 01:10:47 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r1 = inotify_init1(0x0) read(r1, &(0x7f00000000c0)=""/9, 0x9) 01:10:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/dev/char', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xb, 0x30, r5, 0x10000000) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x5, 0x6000, @fd_index=0x7, 0x800, 0x0, 0x0, 0x0, 0x1, {0x0, r7}}, 0xf72b) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:10:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000002, 0x13, 0xffffffffffffffff, 0x8000000) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) pread64(r1, &(0x7f0000000340)=""/149, 0x95, 0x400) syz_io_uring_setup(0x24f1, &(0x7f0000000080)={0x0, 0x3ebf, 0x10, 0x0, 0x72}, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000180)=0x0) r3 = open_tree(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x100) syz_io_uring_submit(r0, r2, &(0x7f0000000300)=@IORING_OP_SEND={0x1a, 0x5, 0x0, r3, 0x0, &(0x7f0000000280)="3463cb63e4e75baf47cda1687721dc142fd2ae24405d70ae74e298c123b8f88f4fefd0b2f4860920e1f03406043fa64f148c64ba261627546a34cfc5912e1b5bcfa63fa2f6d96aad4d0a0c470e0f6f37108db496cd", 0x55, 0x8004, 0x1}, 0x9) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="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"]) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:10:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0401273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:47 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:10:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40400, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f0000000240)={'batadv_slave_0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x0, 0x6, 0x3f, 0x20, 0x0, 0xbcd, 0x40104, 0xb, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_config_ext={0x7, 0x7}, 0xa800, 0x24d, 0x2, 0x9, 0x8000, 0x77, 0x5, 0x0, 0xc6e3, 0x0, 0x427}, 0x0, 0xd, r5, 0x0) 01:10:47 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2677.885943] kauditd_printk_skb: 71 callbacks suppressed [ 2677.885956] audit: type=1326 audit(1713661847.293:17645): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.891550] audit: type=1326 audit(1713661847.298:17646): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.894761] audit: type=1326 audit(1713661847.301:17647): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.899323] audit: type=1326 audit(1713661847.301:17648): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.913928] audit: type=1326 audit(1713661847.301:17649): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.924434] audit: type=1326 audit(1713661847.306:17650): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.934714] audit: type=1326 audit(1713661847.306:17651): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.942884] audit: type=1326 audit(1713661847.310:17652): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.954944] audit: type=1326 audit(1713661847.310:17653): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.963200] audit: type=1326 audit(1713661847.317:17654): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14653 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2677.967998] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2677.967998] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2677.967998] 01:10:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481223, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2677.984194] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2677.986552] EXT4-fs (loop0): get root inode failed [ 2677.987432] EXT4-fs (loop0): mount failed 01:10:47 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) [ 2678.005821] blktrace: Concurrent blktraces are not allowed on loop8 01:10:47 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2678.085139] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2678.085139] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2678.085139] [ 2678.091860] blktrace: Concurrent blktraces are not allowed on loop8 [ 2678.140424] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated 01:10:47 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) 01:10:47 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = syz_open_dev$vcsu(&(0x7f0000000000), 0x1, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'syz_tun\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2678.154358] EXT4-fs (loop5): get root inode failed [ 2678.155440] EXT4-fs (loop5): mount failed [ 2678.169451] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2678.169451] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2678.169451] 01:10:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481225, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:10:47 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x624cce4a}}, './file0\x00'}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000440)=ANY=[@ANYBLOB="01ea0000000000000000000027621648a39a4fc07703c5c9c3552721726e028edec6e00824263dd770de34fb90bd59538403294b81a5433aab87a969eafaff1434a43a2021d8ba3318720c5277b3b007f7af0300000000000000e5f9e62e5faa43dc435d929e4b14239cc26c427a6f582b93897b3a34ac952115d7fd7d7e7b0d33b6c401077a744a310c55b7b301622ad74aaff77cbbae9a953e935f4de887f76f7aef3602c712443c311ea91eb70f5ee847a4b62aa5780fd1cb0b", @ANYBLOB="b060e605e4167b7459b7a3129e39374603aeb74fe6c7fe93786182c0b4d3169ec68082708375f27b242cff8a7b41479366d3c418c70df5b301597015f46e7eaa7822956d4708bc05a84bcea3cdb9", @ANYRES32=r1]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2678.222955] blktrace: Concurrent blktraces are not allowed on loop8 [ 2678.226910] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated 01:10:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000240)='romfs\x00', 0x50814, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x1, @private2={0xfc, 0x2, '\x00', 0x2}, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x2, 0xfc, 0x0, 0x0, 0x5e, 0x1222, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xab}, 0x0, 0x3, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2678.234186] blktrace: Concurrent blktraces are not allowed on loop8 [ 2678.238657] EXT4-fs (loop0): get root inode failed [ 2678.239215] EXT4-fs (loop0): mount failed 01:10:47 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2678.424083] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2678.424083] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2678.424083] [ 2678.446907] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2678.455856] EXT4-fs (loop5): get root inode failed [ 2678.456669] EXT4-fs (loop5): mount failed 01:11:00 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000040)=0x28) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:00 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) 01:11:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2, 0x49, 0x18, 0x4, 0x0, 0x6, 0x8b4, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7317, 0x0, @perf_config_ext={0x686, 0x4}, 0x12802, 0x7fffffff, 0x9, 0x5, 0x5, 0x7, 0xff, 0x0, 0x7, 0x0, 0x10000}, 0x0, 0x8, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:11:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc048122a, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:00 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:00 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000000) dup2(0xffffffffffffffff, r5) 01:11:00 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x8, 0x100, 0x7fff, 0x80001}) r1 = inotify_init1(0x0) read(r1, &(0x7f00000000c0)=""/9, 0x9) [ 2691.391338] kauditd_printk_skb: 163 callbacks suppressed [ 2691.391349] audit: type=1326 audit(1713661860.798:17818): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.394097] audit: type=1326 audit(1713661860.801:17819): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.397136] audit: type=1326 audit(1713661860.803:17820): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.401413] audit: type=1326 audit(1713661860.803:17821): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.406653] audit: type=1326 audit(1713661860.803:17822): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.415993] audit: type=1326 audit(1713661860.804:17823): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.421484] blktrace: Concurrent blktraces are not allowed on loop8 [ 2691.428286] audit: type=1326 audit(1713661860.804:17824): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.442363] blktrace: Concurrent blktraces are not allowed on loop8 [ 2691.447840] audit: type=1326 audit(1713661860.806:17825): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.457309] audit: type=1326 audit(1713661860.806:17826): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2691.472581] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2691.472581] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2691.472581] [ 2691.479578] audit: type=1326 audit(1713661860.806:17827): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14714 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:11:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc048122b, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:00 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) [ 2691.526432] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2691.528952] EXT4-fs (loop5): get root inode failed [ 2691.529421] EXT4-fs (loop5): mount failed 01:11:00 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) 01:11:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000000000003, 0xac}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x6, 0x6, 0xf9, 0x0, 0x1, 0xc1048, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x4, 0x10000}, 0x800, 0x2, 0x1f, 0x3, 0x8001, 0x1, 0x8000, 0x0, 0x5, 0x0, 0xf3}, r1, 0x8, 0xffffffffffffffff, 0x3) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:11:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2691.569181] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2691.569181] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2691.569181] 01:11:00 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2691.590125] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2691.591808] blktrace: Concurrent blktraces are not allowed on loop8 [ 2691.598632] EXT4-fs (loop0): get root inode failed [ 2691.599108] EXT4-fs (loop0): mount failed 01:11:01 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x8, 0x100, 0x7fff, 0x80001}) 01:11:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x8, @local, 0x7ff}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="050000230a1acb002e2f66696c653000"]) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2691.641875] blktrace: Concurrent blktraces are not allowed on loop8 01:11:01 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc048122d, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:01 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x8, 0x100, 0x7fff, 0x80001}) [ 2691.736165] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2691.736165] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2691.736165] [ 2691.759736] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2691.761562] EXT4-fs (loop5): get root inode failed [ 2691.762049] EXT4-fs (loop5): mount failed [ 2691.823018] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2691.823018] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2691.823018] [ 2691.842863] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2691.845884] EXT4-fs (loop0): get root inode failed [ 2691.846982] EXT4-fs (loop0): mount failed 01:11:13 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = inotify_init1(0x0) read(r0, &(0x7f00000000c0)=""/9, 0x9) 01:11:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x6020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x8, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) syz_open_dev$mouse(&(0x7f0000000080), 0x3ff, 0x501000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:11:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc048122e, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:13 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}}, 0x10) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:13 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:13 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x8, 0x100, 0x7fff, 0x80001}) 01:11:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, @perf_config_ext={0x4, 0x101}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@sco}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r5, 0x0, 0x0, 0x0, {0x80}, 0x1}, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2704.026234] kauditd_printk_skb: 174 callbacks suppressed [ 2704.026252] audit: type=1326 audit(1713661873.433:18002): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2704.032322] audit: type=1326 audit(1713661873.439:18003): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2704.041921] audit: type=1326 audit(1713661873.448:18004): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2704.047572] audit: type=1326 audit(1713661873.448:18005): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:11:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000000000003, 0xac}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x6, 0x6, 0xf9, 0x0, 0x1, 0xc1048, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x4, 0x10000}, 0x800, 0x2, 0x1f, 0x3, 0x8001, 0x1, 0x8000, 0x0, 0x5, 0x0, 0xf3}, r1, 0x8, 0xffffffffffffffff, 0x3) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2704.061787] audit: type=1326 audit(1713661873.449:18006): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2704.077785] audit: type=1326 audit(1713661873.449:18007): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2704.085257] audit: type=1326 audit(1713661873.449:18008): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:11:13 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xfffffffffffffffd, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:11:13 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x0, 0x100, 0x7fff, 0x80001}) [ 2704.101913] audit: type=1326 audit(1713661873.449:18009): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2704.108785] audit: type=1326 audit(1713661873.449:18010): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:11:13 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) r6 = openat2(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x2101, 0x80, 0x6}, 0x18) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000280)={0x7254, 0xeb6, 0x5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2704.121762] audit: type=1326 audit(1713661873.449:18011): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2704.143144] blktrace: Concurrent blktraces are not allowed on loop8 [ 2704.150889] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2704.150889] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2704.150889] [ 2704.160576] blktrace: Concurrent blktraces are not allowed on loop8 01:11:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc048122f, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2704.211949] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated 01:11:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481230, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2704.216209] EXT4-fs (loop5): get root inode failed [ 2704.217278] EXT4-fs (loop5): mount failed 01:11:13 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x0, 0x0, 0x7fff, 0x80001}) 01:11:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb12f, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x0, &(0x7f00000012c0)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/35, 0x23}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000380)=""/30, 0x1e}, {&(0x7f00000003c0)=""/81, 0x51}, {&(0x7f0000000540)=""/172, 0xac}, {&(0x7f0000000600)=""/223, 0xdf}, {&(0x7f0000000700)=""/210, 0xd2}], 0x7, &(0x7f0000000800)=ANY=[@ANYBLOB="1c00000000000000010000210a000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x40}}, {{&(0x7f0000000840)=@abs, 0x6e, &(0x7f0000000e00)=[{&(0x7f00000008c0)=""/234, 0xea}, {&(0x7f00000009c0)=""/93, 0x5d}, {&(0x7f0000000a40)=""/138, 0x8a}, {&(0x7f0000000b00)=""/53, 0x35}, {&(0x7f0000000b40)=""/178, 0xb2}, {&(0x7f0000000c00)=""/120, 0x78}, {&(0x7f0000000c80)=""/179, 0xb3}, {&(0x7f0000000d40)=""/130, 0x82}], 0x8}}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000e80)=""/213, 0xd5}], 0x2, &(0x7f0000000fc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000001080), 0x6e, &(0x7f0000001140)=[{&(0x7f0000001100)=""/60, 0x3c}], 0x1, &(0x7f0000001180)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffff0000"], 0x40}}], 0x4, 0x40000020, &(0x7f0000001300)={r3, r4+60000000}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) getpeername(r5, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x80) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:11:27 executing program 6: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) read(r0, &(0x7f00000000c0)=""/9, 0x9) 01:11:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481258, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x26, &(0x7f00000001c0)={0x0, 0x2, 0x0, 0x0, r2}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000081000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_PMK(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r6, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x1, 0x5d}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000841}, 0x4000) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2717.962581] kauditd_printk_skb: 30 callbacks suppressed [ 2717.963510] audit: type=1326 audit(1713661887.369:18042): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2717.967234] audit: type=1326 audit(1713661887.369:18043): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2717.984979] blktrace: Concurrent blktraces are not allowed on loop8 [ 2717.991860] audit: type=1326 audit(1713661887.369:18044): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2718.007990] audit: type=1326 audit(1713661887.370:18045): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2718.017389] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2718.017389] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2718.017389] 01:11:27 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:27 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x5}, [{0x2, 0x6}, {}, {0x2, 0x4}], {0x4, 0x2}, [{0x8, 0x5}, {0x8, 0x4}, {0x8, 0x1}, {0x8, 0x3}, {0x8, 0x2, 0xee00}, {}], {0x10, 0x4}, {0x20, 0x6}}, 0x6c, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) getgroups(0x8, &(0x7f0000000140)=[0xee00, 0xee01, 0x0, 0xee01, 0x0, r0, 0x0, r1]) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x9, &(0x7f00000009c0)=[{&(0x7f0000000240)="bb92cbc01e3af8d5888a84957e7a6d09f831288a378d1771086a3257303507139f6ef52257c9bc9f130761e3ab9c3a612942510594170d6eeeeb9f980f7e116d2cab325e407ab9f203d7139ebad8bbea62db540ded2bd97f376d59252e6431accd53e4cddf3ebae1adcde3287ed9eefc9d1f347ed2866131551b94b8fc3a0a90775dafc68f00eef353c6a47c06", 0x8d, 0xde}, {&(0x7f0000000300)="4f5c99707ed77705b37b107526aa96106c235aba0040372fc392a9ea58d691a8bc24faa53865e0196257c04d07e44c3aea622bfed0a8e8cda3614622c4d26a2761bc3a22274f2808d67c27e27ab3e5a7cd1ce790bb29e55d51fdf98ff01ad7943b5e1fa4ff7736f9f8fd4148c0339e", 0x6f, 0x9}, {&(0x7f0000000380)="85a9e4f4eefca5f9493af7d84b0b50122c18843c3022b3253cafceaafb367e5879a9ac73955ac3d37a6d0e4b323593d4f617542e45d98c6c5ce5249a9309c95a109006d81fa0df715ff5", 0x4a, 0x9}, {&(0x7f0000000400)="81be3ef0395497bd1e119a0c8b4ec425d201031288d3c41fe9b89250eba431967c8ec9fac170db3b3fe241b93d03a35470856c27a6f8dc63b40209607758ff2f02048d6cbd11bef5d0b58ca3cb8980856bfeb5d27697c494087dbb4c", 0x5c, 0x6}, {&(0x7f0000000540)="5d6db32af193a4a1b82f2f3eb03e8a0b5ba5d2d20cefc61b6ae23df5331067f1095a4e3714ad6d873f900b136a5ecc8322509d0b9ae7f71ed8ab56897cdfe6504e1927e46c13e36ea90ab32dcf9b0bbce2390990455915e3d8d29c5a05fdb53847a6e22df270af38f45e00290b763d20ba0ce38b36da4e209083d3da5124a0632ccb0f5648bd4337239f521c9fd99565e3358b132e83e754f260aba4dc1d1dc26bea60fdac57ca31da60c106dbc98ab66f18c38c24d48f19053ee27ff92de6a17108ab2a8ddc88cb9ab2ce50ced0deb70b4cc605f248add02d58d5132265deb118590438561da705e1731613", 0xec, 0xffffffffffffff80}, {&(0x7f0000000640)="50ecfafcf1b7e5b617cb09b74476034fe92a8830668a638864b10c91eb86b152c5f9bc4de82b79bbcf01690a6b61d2fbe219e10e5e4321cdbf953b363e61a6640a06f8bd6883181ed9ddf848fa331c070a51d9d8eb8db93f728f3aa6f0b98d2938de14e270934631f2cc09ea1e56ca30bb40e1a97b8528a85ffc5b0b794d55542cea5a1bad2931e1f3640234bfc83204f735b04cadb838a22299f31de5e7eb831c63dc2217891597d7d6aea4682952fe39cd0113ab314ec0110cbe10e4a937a32f153c2b73ed1f5f06bad9233eff3b", 0xffffffffffffffdb, 0x8001}, {&(0x7f0000000740)="a17bfb35dc25989c27bb012e86c46823ff249098b823eb17e340daf6b3e6a3283dfd51f7cb642dff6e833069d372959529dda0bd57891dfa695c7848c0168ae7b92a54dc7b645fbbe23a162d62fc07f1515f737d6d27c593947e36c0f03c9bfe27f6a761e7cf16d40443903a0d8e46255a2b534df433315cf0add2823eedee17d3ac548f0d8f3b99c3578fe56286f5cc2cd0fceed1e14c31caf10d432020d2d03d4d71dcbc2a", 0xa6, 0x8}, {&(0x7f0000000800)="ae958f9a6957a9438efac3db6b7a662f1887fe6515b5a04059b02923cfe106d529981ef371b31a0152facff2c56d8f50e6242154b910b834ae8267e112a09e6eb02e04f959b3a03ed619e7dc24743d557e645c80c0c7bcae74da89130f0e235ee881c90acd460b8c24e3dcd44b5b544a269efd89e2591cabe7a6d26cd5a1869b8f04c1eaa8e8b1f477bbf83149e4f16faf3c1f4c99f6644a7c5dad136e9b", 0x9e, 0x7d}, {&(0x7f00000008c0)="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", 0xff, 0xc55}], 0x2002, &(0x7f0000000bc0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB="2c72746e6180653d77696e6e742c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c696f636861727365743d6575632d6a702c736d61636b6673726f6f743d6673002c00e3af7523b61fa7da65c8114ea8b413401b7655b93f88e03d4de11f28ce1fc6c3abe4a8155f30ec85b23ef9f78f98c5d9cb5b8aadf236532014f2c3d6e950aaec06e6e16e800748ded8160d9e8cfd7f771930a2eb95322f451bdfec1993cc80bbe4b08d0cba7184db69e23fb9fe45f0d84ad4d55075c547a236a424450368f5634f"]) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:27 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:27 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200, 0x0, 0x0, 0x0, 0x80001}) 01:11:27 executing program 7: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r5, 0x0, 0x0) 01:11:27 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@loopback, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x200}) [ 2718.027485] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2718.029205] EXT4-fs (loop5): get root inode failed [ 2718.029786] EXT4-fs (loop5): mount failed [ 2718.034788] audit: type=1326 audit(1713661887.381:18046): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2718.075038] audit: type=1326 audit(1713661887.381:18047): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2718.093334] audit: type=1326 audit(1713661887.381:18048): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2718.099984] audit: type=1326 audit(1713661887.382:18049): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:11:27 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2718.105324] audit: type=1326 audit(1713661887.382:18050): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2718.109885] audit: type=1326 audit(1713661887.383:18051): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14845 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2718.130041] blktrace: Concurrent blktraces are not allowed on loop8 [ 2718.141012] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2718.141012] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2718.141012] [ 2718.180790] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2718.187205] EXT4-fs (loop0): get root inode failed [ 2718.187845] EXT4-fs (loop0): mount failed [ 2718.195186] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2718.195186] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2718.195186] [ 2718.219376] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2718.221806] EXT4-fs (loop5): get root inode failed [ 2718.222416] EXT4-fs (loop5): mount failed 01:11:40 executing program 6: r0 = inotify_init1(0x0) read(r0, &(0x7f00000000c0)=""/9, 0x9) 01:11:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@local, 0x5c}) unlinkat(r1, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:40 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2730.981853] kauditd_printk_skb: 120 callbacks suppressed [ 2730.981874] audit: type=1326 audit(1713661900.388:18172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14892 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2730.990589] audit: type=1326 audit(1713661900.397:18173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14892 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2731.008707] audit: type=1326 audit(1713661900.397:18174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14891 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2731.029731] audit: type=1326 audit(1713661900.398:18175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14891 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:11:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481263, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:11:40 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r5}}, 0x73) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00', 0x10, 0x8100, 0x23456, {0x0, r5}}, 0x6) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:11:40 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2506000000840106804800040067636d286165732900000000000000000000000000000000000000000000000020000000d240dd0383eb996ca62cfd8227984706cb90dd8417df05e749edd24dd19787474800040067636d286165732900000000000000000000000000000000000000000000000020000000ed9f2201bdca8c7176291e256b57814fb9d77e9ee31fb31f0b658f579079e65c3d00040067636d2861657329000000000000000000000000000000000000000000000000150000001ce398497f37d90cb72c4085a1e7da127e6325c900000000a9000300b31b484a5f222726888d078b26c3ce73ceec480da079fa8ff4be961df08ece710b230b5233aee6f7372d6dbd2bd1d5099488f3f0234e40a52edfd40e28f1eb8b38b0fd5c6d0fc0c6606841d8e18256b3a2203245aa4db8712c99e9fe73ca30e935a28012f3c63e612f7b635c6b039d3e26d96d93ed127427e69437e1650c2c418a69c2502c331419b2c8df03c26e59ed57f34f9b5e5aa1df94a610e0a2ba028ab7bc2722af00000004000200180004801300010062726f6164636173742d6c696e6b00000c0003800800030095ffffff7c000580240002800800010017000000080001000300000008000300ffffff7f080004000800000044000280080003000100008008000200020000000800020073c5ffff08000200010000000800040007000000080004007b6e000008000100180000000800020005000000080001006574680008000100756470005400038008000300b2000000080003000000010008000200010000000800010081000000080002003f000000080001000600000008000200ffff0000080001000600000008000300000000000800020006000000700002800400040008000100000100000800020002000000080002000300000008000200030000002c00038008000200000000000800010005000000080002003f00000008000200990a000008000200000400000c0003800800020081ffffff08000200ffffff7f08000100cc2d6a6e"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r5, 0x0, 0x0) [ 2731.041738] audit: type=1326 audit(1713661900.398:18176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14891 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2731.050222] blktrace: Concurrent blktraces are not allowed on loop8 [ 2731.057348] audit: type=1326 audit(1713661900.402:18177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14891 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2731.070056] audit: type=1326 audit(1713661900.409:18178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14891 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2731.078313] audit: type=1326 audit(1713661900.409:18179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14891 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2731.092389] blktrace: Concurrent blktraces are not allowed on loop8 [ 2731.109352] audit: type=1326 audit(1713661900.409:18180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14891 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2731.113374] audit: type=1326 audit(1713661900.410:18181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14892 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:11:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481264, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2731.133867] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2731.133867] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2731.133867] [ 2731.177947] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated 01:11:40 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2506000000840106804800040067636d286165732900000000000000000000000000000000000000000000000020000000d240dd0383eb996ca62cfd8227984706cb90dd8417df05e749edd24dd19787474800040067636d286165732900000000000000000000000000000000000000000000000020000000ed9f2201bdca8c7176291e256b57814fb9d77e9ee31fb31f0b658f579079e65c3d00040067636d2861657329000000000000000000000000000000000000000000000000150000001ce398497f37d90cb72c4085a1e7da127e6325c900000000a9000300b31b484a5f222726888d078b26c3ce73ceec480da079fa8ff4be961df08ece710b230b5233aee6f7372d6dbd2bd1d5099488f3f0234e40a52edfd40e28f1eb8b38b0fd5c6d0fc0c6606841d8e18256b3a2203245aa4db8712c99e9fe73ca30e935a28012f3c63e612f7b635c6b039d3e26d96d93ed127427e69437e1650c2c418a69c2502c331419b2c8df03c26e59ed57f34f9b5e5aa1df94a610e0a2ba028ab7bc2722af00000004000200180004801300010062726f6164636173742d6c696e6b00000c0003800800030095ffffff7c000580240002800800010017000000080001000300000008000300ffffff7f080004000800000044000280080003000100008008000200020000000800020073c5ffff08000200010000000800040007000000080004007b6e000008000100180000000800020005000000080001006574680008000100756470005400038008000300b2000000080003000000010008000200010000000800010081000000080002003f000000080001000600000008000200ffff0000080001000600000008000300000000000800020006000000700002800400040008000100000100000800020002000000080002000300000008000200030000002c00038008000200000000000800010005000000080002003f00000008000200990a000008000200000400000c0003800800020081ffffff08000200ffffff7f08000100cc2d6a6e"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r5, 0x0, 0x0) [ 2731.186912] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2731.186912] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2731.186912] [ 2731.199378] EXT4-fs (loop5): get root inode failed [ 2731.200414] EXT4-fs (loop5): mount failed [ 2731.249256] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2731.252842] EXT4-fs (loop0): get root inode failed [ 2731.253906] EXT4-fs (loop0): mount failed 01:11:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000280)=0xe, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'veth1_macvtap\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:11:40 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x800, 0x39) copy_file_range(r2, &(0x7f00000000c0), r0, &(0x7f0000000100)=0x80, 0x3, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="f9ff0000c1d3f9fba5455dea873cfe00000000000000006c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) dup2(0xffffffffffffffff, r3) [ 2731.297964] blktrace: Concurrent blktraces are not allowed on loop8 [ 2731.306320] blktrace: Concurrent blktraces are not allowed on loop8 01:11:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a000, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r5, &(0x7f0000000000)=@IORING_OP_NOP={0x0, 0x1}, 0xff) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:40 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481269, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x6, 0x8, 0x81, 0x2}) [ 2731.435819] blktrace: Concurrent blktraces are not allowed on loop8 [ 2731.510547] blktrace: Concurrent blktraces are not allowed on loop8 01:11:54 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = dup3(r1, r3, 0x80000) r6 = socket$inet_icmp(0x2, 0x2, 0x1) sendto(r5, &(0x7f0000000240)="21cf856cba72c6e039a915cd60d757ad50f01e3added3d9d9cb74641d7c9563501f7fc94bba113547b1b0180ecf1a04ff2a875f5a74df5634e2a55d0e071db28c5e4f93e96c4b209f7feec7cb79498f6c2979be2762517f8beac60813e3b1e1cc0b05b3c2ec3cd61b6e718fedf1d2c9c81cad58db7437834e4d4e2af87e34f42d532e96013b19c5b382141ef0537a3cddec2c6958b9132df4c0c9fda4f4c48c925e5d6e0bfdef114f383675718e2e74efaa4cf2edd70b5869699d690", 0xbc, 0x0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r6, 0x0, 0x4, 0x4, 0x4, {0xa, 0x4e24, 0x7fffffff, @remote, 0xfffffffd}}}, 0x80) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:11:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc048126c, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2744.964723] kauditd_printk_skb: 115 callbacks suppressed [ 2744.964735] audit: type=1326 audit(1713661914.371:18297): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2744.967209] audit: type=1326 audit(1713661914.372:18298): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2744.971894] audit: type=1326 audit(1713661914.379:18299): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:11:54 executing program 4: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @qipcrtr={0x2a, 0x3, 0x7fff}, @hci={0x1f, 0x0, 0x4}, @xdp={0x2c, 0xa, 0x0, 0x31}, 0x89c1, 0x0, 0x0, 0x0, 0xfff9, 0x0, 0x0, 0x80000000, 0xfff8}) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x11, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c106089e8, 0x0, 0x9, 0x6, 0x0, 0x1000000, 0x0, 0x0, 0xfffffffe}, 0x0, 0xb, r1, 0x3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_elf64(r3, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0xa3, 0x0, 0x6, 0x53a6983b, 0x3, 0x6, 0xffff, 0x23d, 0x40, 0x3c, 0x0, 0xff, 0x38, 0x2, 0xfe00, 0x9, 0x497d}, [{0x7, 0x8, 0x9, 0x3, 0x5, 0x8, 0x0, 0x5}, {0x6, 0x81, 0x6, 0x6548, 0x0, 0xffff, 0x1400000, 0xfffffffffffffffd}], "e2d32a72d59557fdbf600515d35c8b847ce0abcc4be32ca0c89b0b23b4565d3023d7292ab9c7d6175124d5135ba60a7bac2a15733522bcabba5b0c1b2334ba3ef09476d99d45320d1b6de4c2c39704", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5ff) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0102000000faa20000"]) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f00000001c0)=0x8) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:11:54 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2506000000840106804800040067636d286165732900000000000000000000000000000000000000000000000020000000d240dd0383eb996ca62cfd8227984706cb90dd8417df05e749edd24dd19787474800040067636d286165732900000000000000000000000000000000000000000000000020000000ed9f2201bdca8c7176291e256b57814fb9d77e9ee31fb31f0b658f579079e65c3d00040067636d2861657329000000000000000000000000000000000000000000000000150000001ce398497f37d90cb72c4085a1e7da127e6325c900000000a9000300b31b484a5f222726888d078b26c3ce73ceec480da079fa8ff4be961df08ece710b230b5233aee6f7372d6dbd2bd1d5099488f3f0234e40a52edfd40e28f1eb8b38b0fd5c6d0fc0c6606841d8e18256b3a2203245aa4db8712c99e9fe73ca30e935a28012f3c63e612f7b635c6b039d3e26d96d93ed127427e69437e1650c2c418a69c2502c331419b2c8df03c26e59ed57f34f9b5e5aa1df94a610e0a2ba028ab7bc2722af00000004000200180004801300010062726f6164636173742d6c696e6b00000c0003800800030095ffffff7c000580240002800800010017000000080001000300000008000300ffffff7f080004000800000044000280080003000100008008000200020000000800020073c5ffff08000200010000000800040007000000080004007b6e000008000100180000000800020005000000080001006574680008000100756470005400038008000300b2000000080003000000010008000200010000000800010081000000080002003f000000080001000600000008000200ffff0000080001000600000008000300000000000800020006000000700002800400040008000100000100000800020002000000080002000300000008000200030000002c00038008000200000000000800010005000000080002003f00000008000200990a000008000200000400000c0003800800020081ffffff08000200ffffff7f08000100cc2d6a6e"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r5, 0x0, 0x0) 01:11:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:54 executing program 6: inotify_init1(0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) [ 2744.974071] audit: type=1326 audit(1713661914.379:18300): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2744.987922] audit: type=1326 audit(1713661914.379:18301): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2744.990080] blktrace: Concurrent blktraces are not allowed on loop8 [ 2744.995029] audit: type=1326 audit(1713661914.383:18302): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2745.002271] audit: type=1326 audit(1713661914.384:18303): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2745.016308] audit: type=1326 audit(1713661914.385:18304): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:11:54 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2745.025959] audit: type=1326 audit(1713661914.391:18305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2745.034226] audit: type=1326 audit(1713661914.391:18306): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14950 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:11:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc048126f, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2745.054020] blktrace: Concurrent blktraces are not allowed on loop8 [ 2745.080350] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2745.080350] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2745.080350] [ 2745.090240] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2745.095156] EXT4-fs (loop5): get root inode failed [ 2745.095950] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2745.095950] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2745.095950] [ 2745.096483] EXT4-fs (loop5): mount failed [ 2745.107627] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2745.110073] EXT4-fs (loop0): get root inode failed [ 2745.110652] EXT4-fs (loop0): mount failed 01:11:54 executing program 6: inotify_init1(0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) 01:11:54 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:54 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:54 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:11:54 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:11:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:11:54 executing program 6: inotify_init1(0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/9, 0x9) 01:11:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481270, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2745.332797] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2745.332797] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2745.332797] [ 2745.348475] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2745.351426] EXT4-fs (loop0): get root inode failed [ 2745.352225] EXT4-fs (loop0): mount failed 01:11:54 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2506000000840106804800040067636d286165732900000000000000000000000000000000000000000000000020000000d240dd0383eb996ca62cfd8227984706cb90dd8417df05e749edd24dd19787474800040067636d286165732900000000000000000000000000000000000000000000000020000000ed9f2201bdca8c7176291e256b57814fb9d77e9ee31fb31f0b658f579079e65c3d00040067636d2861657329000000000000000000000000000000000000000000000000150000001ce398497f37d90cb72c4085a1e7da127e6325c900000000a9000300b31b484a5f222726888d078b26c3ce73ceec480da079fa8ff4be961df08ece710b230b5233aee6f7372d6dbd2bd1d5099488f3f0234e40a52edfd40e28f1eb8b38b0fd5c6d0fc0c6606841d8e18256b3a2203245aa4db8712c99e9fe73ca30e935a28012f3c63e612f7b635c6b039d3e26d96d93ed127427e69437e1650c2c418a69c2502c331419b2c8df03c26e59ed57f34f9b5e5aa1df94a610e0a2ba028ab7bc2722af00000004000200180004801300010062726f6164636173742d6c696e6b00000c0003800800030095ffffff7c000580240002800800010017000000080001000300000008000300ffffff7f080004000800000044000280080003000100008008000200020000000800020073c5ffff08000200010000000800040007000000080004007b6e000008000100180000000800020005000000080001006574680008000100756470005400038008000300b2000000080003000000010008000200010000000800010081000000080002003f000000080001000600000008000200ffff0000080001000600000008000300000000000800020006000000700002800400040008000100000100000800020002000000080002000300000008000200030000002c00038008000200000000000800010005000000080002003f00000008000200990a000008000200000400000c0003800800020081ffffff08000200ffffff7f08000100cc2d6a6e"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2745.440066] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2745.440066] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2745.440066] 01:11:54 executing program 6: r0 = inotify_init1(0x0) read(r0, 0x0, 0x0) [ 2745.485745] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2745.488861] EXT4-fs (loop5): get root inode failed [ 2745.489361] EXT4-fs (loop5): mount failed 01:11:54 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xc000000, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0x9}, {0x5, 0xfffffff9}]}, 0x18, 0x0) getgroups(0x3, &(0x7f0000000ac0)=[0x0, 0xee00, 0xee00]) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfd, 0x1000000}, 0xc, &(0x7f0000000480)=[{&(0x7f0000000540)={0x4c0, 0x37, 0x10, 0x70bd25, 0x25dfdbfd, "", [@nested={0x4, 0x84}, @generic="b8d9c9ca89517c2091f662ba90c0b7105436fb4b7438d0cadc9553cbc494e661667a7e8b3eb6199a3e6b119f224909e5d5e1fba2b23df10cc00f69a3d20b4dc0c2a13bcd6ff3caafee23104478df869217250d44f965dfc4f418d1633b2bfb46b4864de671b5619b44c079bbdf9ada1fe6ab8f1e420cee97267b2a5fd5ed2c20c3afe191f1eac09d0114f248469502f081a12a8bfccf9c93ba42a1e0c2d6086e81f7d39e21f0d45328d8ba10dc70e686563abc5053e8c338d282098c5a0c04ba2ac1188c94f299227f337f99413c24171d5383369e243c5cea057f13c06129", @generic="76675c8247d9eef93b318659ec960f445b4ca559adaaf28b8719be7572a36e868c15f8259fb05e2ade0d373897ea1961ef962a60a92a7181149d977efd55ad0b7d3d233d8f06ccd492e78666a73adc817cff782f57698ce7e00747703e6d330037cc83231919d1a508a83a97bd57b8c18eb885048cc07285bef2bb9ef67e51c3858e833483fb84a5730d92fff85dfd9c9e4bc58ee2fe1d0e96067322130f04bb8e3ea5265c316c59658a7286898758e5f1d196298e8d7bc4db88d4", @nested={0x305, 0x7a, 0x0, 0x1, [@typed={0x6, 0x2b, 0x0, 0x0, @str='^\x00'}, @typed={0x4, 0x52}, @generic="6ebc8d96e7739140f4ab9ad815d5f5edcab3b8a4a908a255696a108483d1cfe461142c10b0d94284005770ee561652b6492a64cfb82b4cd5dc4fbb2f18b7f1d1e82d8822550688cc1da62cfe4afe31c92ef797bed63cbf3665c002dc317fdd880425e7adcac7e7e8b670f30b1dab160a7a1fcf6ef283c6924f39f3ba7e9ade97791eda31cc1268cdae5d766074727322ce7944777530818b170a01251db7d53f4fb373af4ab44c0ff9c654ff6091d77038a178605fd77c27dc02df2821692eaeb9507d07e9f0005d417c96321c40d6fc3895c0474c2994b261c460d97cb18c0953675b6bdf064ad2396aba0d0c7e8a0354ad9be77da3aeebd0", @typed={0xcd, 0x21, 0x0, 0x0, @binary="6c0d18ac0e5359acc31d428644ce5be9ad5a97542232df6c38da29c83e345fb5a9264a332e523807a43ec573afa6381c9b91a7ade0a5f12bc4172ed06392ba10eb25f3e79c28c412f4019ac17d2bf532434c171f15610f404f7e7e7eca0a6a1cafdb2ac0f6d489fc5fc636fef048654eadff863d4f4438b7ccf916e74791d30c667d36de1338a9e79ead0921f855ee917d9f529f7dc6d3fc26be9e51805906102e90d71f18b678b32b969fcc72d7ceb0c85c5632893237555bcb3423bff79f49b33de0547ba00c5948"}, @generic, @generic="ea28cce06496b004c1497f36cf5317ff0db84c376551214b01707fc4f15edabca28bd8556eedb592b2f2989553a6f8e51941fab15ec416bb2a7ace", @generic="d870c8a7ebb379b5dd3076a811b754e571063f8826b95b6efab49f0450130d2796e6b38b38089b506d5ddedef54f470039fc9606d997a9c94e12e4d6ba52dfe07d081604345954bbd951e794303ab88c1ab6de5714c0fce85624746b487dc30fc5b87e802961e50e7f30961b60057576fe87420b3ea6b5270de24ccc3172f5a2c591c90cba62f4d8ff569edb0a25dd10e683281fbc24", @generic="25f0677f78f1c4e76b500d84d8b854e4ab7427d097be7c7b90443ee8fa26437206e13f9ddfc70d3b360373a4b494c6d7e3939fc354d05b5bfca4b7d72957c40a2377e417f97a47", @typed={0x8, 0x88, 0x0, 0x0, @u32=0x8}, @typed={0xb, 0x2, 0x0, 0x0, @str='*\'a&!*\x00'}]}, @typed={0x8, 0x36, 0x0, 0x0, @pid}]}, 0x4c0}, {&(0x7f0000000300)={0x174, 0x1b, 0x1, 0x70bd25, 0x25dfdbfc, "", [@generic="c55f520d96dfe7739457a199832e0a559d82b9a3baf365c501668cac87f44867d59bc7717cdc0fdd7ca7964cc52c70", @nested={0x12c, 0x45, 0x0, 0x1, [@generic="51df05a53c4fbf732a1922b24881045f42528f985c1ea28e0949dc41d694e6f34ce3264baa1bfbcc938926", @generic="9223cccbc50f87de2fdecbc208b6d5f4313a4cc73e801bc09639805ec53097a0fd576fd4a5", @typed={0x8, 0x7c, 0x0, 0x0, @u32=0xc82c}, @typed={0x8, 0x85, 0x0, 0x0, @uid}, @generic="b827e11e0e6c3a618c8f9f2f41d3d92b76126b12e723f86f4443baac4a3e73d3b049b551243b5496e6e52592cce89883bd1167e84058a5eccc83e2791a6f5f2144241c213721f65ec8fd6e181437b8138075c33e2ed36a6447785be468b61eeaea823883ac0e1fcef39957c0a54572fbe0b2b010a5a4491f2ddde94429e30b887f5263594bea813f11c2c20a031916a1260676d4c13378b0c359f3e59f3a44382f7c1bc738934e4fd34b1bec9d180d4cdb54e35077f1c307affebb007da5853a330959aaef13eaf1"]}, @typed={0x8, 0x18, 0x0, 0x0, @uid=0xee01}]}, 0x174}, {&(0x7f0000000a00)={0xb8, 0x3f, 0x1, 0x70bd28, 0x25dfdbfe, "", [@generic="ba4bc9add1df682e14dbc229b866433b29fb12ca5e672539f1bbad730324b24d9629434d7d94e647470972397326c37c3556df46e51670e61759cb34122bfb15750bbcc7d4b1b94a09a6430b6e9b82bc71ea6f034720b723389e6a021beee73b7e8f8ce70f88120a057ce5218ce81e622895595601cf17208ce6bec1f15e642039c0ed8ce7629e4831a319e06d2696dc2c42f0dfb43e17c25588600300dd81c0a59a21858547a240"]}, 0xb8}], 0x3, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}], 0x20, 0x4000}, 0x840) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:11:54 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:11:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481275, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:11:54 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:11:55 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0xffffffff, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2745.616352] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2745.616352] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2745.616352] [ 2745.653058] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2745.655789] EXT4-fs (loop0): get root inode failed [ 2745.656269] EXT4-fs (loop0): mount failed [ 2745.683849] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2745.683849] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2745.683849] [ 2745.691806] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2745.694461] EXT4-fs (loop5): get root inode failed [ 2745.695122] EXT4-fs (loop5): mount failed 01:12:08 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:08 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:08 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:12:08 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:12:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481278, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:12:08 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2759.283227] kauditd_printk_skb: 247 callbacks suppressed [ 2759.283244] audit: type=1326 audit(1713661928.690:18554): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15040 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2759.289097] audit: type=1326 audit(1713661928.694:18555): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15047 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:12:08 executing program 4: ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)={'b', ' *:* ', 'rwm\x00'}, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="010000009a97a07a66fd0a34812e4f37caccd50100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001440)={0x0, 0x0, "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", "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"}) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x9020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000580)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000001440)={r2, 0x0, "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", "f2d4f367d3f8735604c753b376910e31cabb7c34c3306514be19b9a4c07818b6c4ee2212e34ec63feae572254fb9a5d518b0ce3e86712fde0504fc1de0f7ba24b575b85ab9eb952210b30a74fd801929d65d7734d8b8cb87d7885fe2cb20a1570ec5f570d16f1c6312e9fe6d89ae26639b62de8e743e7c51b6de26b6410c10e18bd47ac39bdb4317d28cf35c70c1644629585847cb1460ffb2986892af040b7eb9c3c676918ce7bfb0b05db021e785be9cd4fdc5cadd66bc16f6630c1d9d43e783e51ab01fa3cd892f5e4e774653499fcf886633cc0d2e89199ce46ab9cfac51073d0f5f22b997e5dcd41db06bc68912be9ba4f7e42439228a6457fc96af40756430ef67586f6fccd5370f358f8ba4947e8f7498d59a62e0b5f87584b24cab23deb31ab346ef7d50fefc369bed4b2664ee073c283b10ddbd85651a15798851f0cf6f94bad16b6cfd53515e1bcbac52993ad0398cfd4eba09611f4860c487cfea8208f52bc3c3511cc49bd6fd81065cdb51ea84f4f1cbcff8b06ced4d3102d69d47365450be9093a6fda085fb3dc6b198c87b0e58ce8f8a00dfc813fd056d5899d00035520c1d0420f72bf9f30cbe5f527c528b209849711c7a59768194a5851de178521c73dbeacc5dcaede110d20b0dead9bd30c1073f556792f383596819f0b22129ec6f0adddaed104c39a0aae4f2c55877df513d8a55fa5f2483a7912ac77e9da7560abe92640e322e226dc2c35de427cfff6ce2f077fd067f4bc832321115b1786f69be9e48aa8d1dbb31ca052d3186260efd0c88a48f7dfd33f767bc770cd9c86c8fb8e00a72620ad9b9e11caa6e69f6de7a34df03e28ec812bdf18d456d2d380c8570a5bfd1b5d3bef1d2b99aa6ff3db85c29d710357e3f96759abc20c974fd6742b70bbadd22913c06d7d7ef4e1674dac1ee6f99abf9bd65f2f7eb660e80d5c84464b19ab3e93c117d1f962ef647340e0ad7a5dca9560ec413ae156e1772c35c8fb5ac830578c7ff30bb08217fc006c75aef2da1ab84812fed20b496e2659d590c051f11e25aee6444beaf43480b68f501d009907255a3fb3dac289db58bcf096c39fc3a05580f456a2d4fc69b7b627133717aa95a713e4bc0b0a94743ffd8efa3396b1fd54c7ec59e11d1019a7be5447d9848b7e58ff8d78bde1c0d6b41e549c794f26478ad2d68f980797b12b1d1ac90c9da6a6fca5fa088f95680db5ed04f4dea00b43af2c4579e61860cd5e2c60da7e7505ab74639850b9df6974dc0b283a8d979d50c6c192de19cfeaa28069d397820759020f8380bc558c7a75ee3d145462debc2ea0915891245912637470dd216ff6d13bafc4a01994d0a1937ec73f8d15bf46a777f5490ca6f8967589b67b4285fad5deff3c6f80106595058d410c557ee962a41307fbff69eb97c11f1bd6be89605ffdaf557f4d29d5780437e5d741305f100bc6c49afb99dfea5f040ac6753de5576947bd9a4eaf04b313fee98d54c1e3dd77348524e1ecbbd942000309af7e28fd2b1c9d0d82eb8018323c467544f5b7236c731c8998270d0e266e320378651eaecc49c31d5fa2447f818ba08dc6a232de99d9deccc624c573ba8ab5e3c313e62febbb93d8c8ad1739bbe4d5130cc4530fbe8d5026b5010cb271d74cfb08f307d0953099f10949e140b84f0722df1582be7f32ad1f2ece103361055c14c792631ce51b31cd27a9f8aff5370549243bbbe3ec88eba3cd352e7b01974a5cf21a86b29e8b715ca2a879053db5503aa6b33198b808130cdd0d8f5a767cdafd2b4c7884224ff9671b7e205c7fde7b901d09a31b9e81607d51368cc4ec8778c684cb8e29a57ca315c5ecf0b1518b39d3c1c00615bef5b7b095ff312caf245b5f3c57abfe95bf577406fd262a0f9bd5a3c9f16f4712ca02d1496ddfb4a8e8bb9682559ebe58b6b2d0545aa0e866e35ec8d70828cf045d4e29c0349ebe3747b2b3b4ee4cc885adbe8ad7c0c939a3a809b01769c5d384b3a7fdc9d5bd30e16a392cec814fc158ae1ad8d4a6c1e366803bd96448195f5b6817299910e1927bd569c03f6ccc39ab152ca59eb4361de94e1a40f377ada6cc0150bbb3401ac5fe1197dfb79931676850213c5d9cae93571ccf74da89b7e789501e4f7672931b859798e7bcbe0c43a83b98cf5269780548a3813f600a08a724c3988a8b648083d0f0abad0003daeecb53318a0231d82033a3b705dc34022591aac5afccce73764b17f68c59bca5d514eb5547c10b9446b9f020b0de25ca40119dab56ddf284f7492b72943d3a515ce67849400b2ed5e3fc8ec00cc6e165aa752d41be7a24350ffc61a9d3f6bc6f8206b1e78cc8c4e7b2ad10c5078598bbc40d0ad2a06793aa1b39b6a1b92e4066e0f011b12ad949edef6d27ef8e1293b4bc447527a2ffe1b4e8419893a44e82f6e5992e7576dbed90631e1c532062724b560379e1e2da5427f0a89f21ed54d99799626fea2958da89d6aad33494940a98eff4c876d64d6a5f106a9407c877d25a4d181351179957c34b5a9cca680d4f6c8b76455ab79d729ce90a94c848c1c316edb26680b034841485bad639cfd8bbf7c767a706fecf20ace9b78e00a92062f6a0a10307785835d3a13bab429d4f9b555ddd37e8324550660ab384ed5bfd46a9ec900af4c6c4fe4f04c5b4bb9f9de045efee56e5aa8687e3c26b654544c8550b1b172833179b7ae5968b36456ba40cd21e87ce628d8c09f196d7086ff16f21975183647ee99d9dbdb9b71f5a7bba9d8779bb02f30a88b90e86d828ce71d3b1521d62f7458bfda0da1bcba0617abc6741fb32d74835ab7a9bc7aad0d0180ebf3ad103c204b9a3939ddba8b24f49572abd1c5d0a5da3ff060b6b40d3f02125e3dbf19e0f915b7d0f4db5a0a67d7c109131b5b53f4cfa287afa3f20b45d09d4c989079092eae96bd390762714d5bbb07f79e2ff131244004f4a029752b5f1691a23502788e3648b6db3f3f686f2db22d85a7ff0cf527deaeb416948c4930f5b5bdefd9965f74a9bcd55aebe44b44d5605edcea02885703b557220056151cba378cf01431fd0f7dc6eb82776127b1188ca8aacc5ecc80fe60ee120ae81b2af2849d1f6f9dd0633991040ab8707b94e173971a8ef2ebb5cdc2284f6d529a387a60bfa7df20442fe396e9cfb1598258563495bd73ab4a5bfb022b0c68d757468271bf958bd2a64110a932d38e86fd865b0ca7347ebe6727c4d5daec7825a6b7d99be1bad3e1e2536fdecf57883305212c4ea902076b5b2914d21f79f5e444abbff0786dad43aa628d7b8de185b73d4cf7c202f9c818285b54d93c4391559023a954818dc42e93c6b1e8a25f4d5dbf74a0c01fa18289e6f20ceda8e2e980e4f7abd8d25629351d6ebd5ae36ac06133c904eb7d74532e41d94cd28b65033768d86007ce3902530e8b9f44fdb3cf64f212a879b4026a84a0e901889487fa576cb9b848f6b2bbfcd551035c9b01ccbe12ef23a8da7bf2ee20f5b83ff2b04307453b684b11601a3e3f5704b2b374aab90b93167ebfbe8d4d7aec9862d2108505aecedea7e6472ff6ddc412a95c94c0cc2d12865092a71172fb7f01b0c39f43158614787481bf6ac6ac0100a0b0765d6dcc6161b1137c6a03128bdfffc73dd9151a235c416f80327cc31a042174db33fcfbf07234102c9a22c705193638088e93b9be38eb6f1335e964c2958db6f6ceb64a25965426475e6a09d3b7129f566d8d5fd2d3dd7f39827b9f9ec201c902ec5057a500bef32eaa1e05c0f56cfed5750531d1169c7cf77e82ddd89685daedd7519223e058a6fe2b34784e9094e42628fac309a34aafb67bf9bae9a0ddc8d4ef6a841fe73deff6beb124b4ffb873308e16ee07a5e197b4125263c9b28d9add948e4b1b9bc628fc62a296420c5cd4b3cbc0d5c5cba26fd3ef8a5cf8b384e44971adb7c65b8652b2a5fb77dc2401bc667cdbf62097246f0245e2d5351106bb7b10bfa96887108e10b2557b7ac329ef1dc8f8a646c22059f29caf32f521c8ce78975b6d7157f2fee22c7dd7be1d2f2ddcb28b427e6131c99bfe4163d8af4b0ac68f8c1914cae01feed29d102997707a2e1b756e23c0770efa2941be78b18769288a73ae8b207de087a4dda5b371e17abfe631fc1796782ba0715580923c834d848db352299319964410a6de32b1d2c96b4368743b7862e56a2cbefb293732f33283e86f63c9c3ec313f62ebc6d748c0b154d4612ff7b994192cdc1fe10ee3223392c2dff3f32255ebe2542baf9b3df39d14fd66ac236a002b50702e35860a0fa317bed37d3f7fa5da5890745e80470bdfa0de666f0e51380eaf7b4d7a38c00389258ecb1ac8719f62f165d88d7403b7fe8355fa11b49970a94ef2ad802c769e9ad6d48cbcc582dee640179ccb57f4d8547d45294b183e392dd90941ea6879c3eda9e09dc9cef4d9da0dfac0658872eb4ddb15a092884ca089b47e9e11c948e6d79ce7d6cfd4d4f379fd3bcc9d7778c4423da5960bcd8ffe120368f8a9d4e5bdaebbe2216e4ba6a4c6c2395a99c9758bdb1846718b14032ccc2d746974bf68c997228d8d0a8f9fa944d53591b23cd78961bfe3ba434149fc6eadde00aec8a04aac02ac7962eeeae73e38319d154e0db89839c493f6906f1ad46ebf2cc234762bcbeea7214704c9682c60c8bfbeca6b30389edac776c8ef3521d3127a143b491bfb4925fd4dacfe48f7bfd32f4d32abf1919f149670fb6025b1b5542f8a1b0ee04c8dcf7196d8dd96d34be434badc002a695bac9a575f3455ce719d0f4f4f3c3e4a01350c84d26bf0de2950e566ec24df40c9a00134ed3ef71ebde32fd16c44eefb0d857e28a2175c53df2ff9613ab965afd0422e99ef2ec690282f31ee6646f15c9eab16eefecc712a8fdb2715d801c1703afe6083a01542a308261109e5d33b1b67315a3c6b33f1fe693e9d01e43a96e40d90b04e819e99d28693ad433aa5ff13d46e6edac121d0a14c53917190436031deffc310db1a8b5993b8c4da999b92464b8bed270f26b42a7a4df1de94fee16e3363e39aa9ea3494ea5bf2f7f0be9db4200d3e903ab4207583bed9515dfbfa70d0ab55f407411874d4dfb53e3055de83537f078993514b0805e004cbc80facf549f47b9500d909e644791abbc4eba441272e29dad6050ead5fe5fb90975b1bdf2968a41ad60b799f5a77ca1e26efae05cf95bac9a68ca1e8849571a4d523437151079732c212c0ab458db025d8d8543c845cfff41bce1406a8c5fb89e23e9a6fa1c8f72f2c37fa4b34d0c68f8e9cef6b51d8c72f787aef509ec98b9a7bd021173008c3e3890bbda67d074f6749cb1133cce35f85227518970e523125bcfee83cb86b7a3c6abf33d30944fc66564df21b14006e0fb780e14e92ee528e4f2577aa8c"}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(r4, 0xd0009412, &(0x7f0000000840)={r5, 0xadac}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004e840)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r5}], 0x6, "4b520657798ea7"}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:12:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000840)={0x0, 0xadac}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f000005f300)={0xffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1f, "2a6bc8f4a12891"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000060300)={0x10000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x81, "2a035c94e8e3e3"}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2759.316055] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2759.316055] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2759.316055] [ 2759.316773] audit: type=1326 audit(1713661928.695:18556): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15040 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2759.340269] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2759.341844] EXT4-fs (loop0): get root inode failed [ 2759.342350] EXT4-fs (loop0): mount failed [ 2759.342693] audit: type=1326 audit(1713661928.695:18557): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15040 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2759.368763] audit: type=1326 audit(1713661928.695:18558): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15040 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2759.371111] audit: type=1326 audit(1713661928.696:18559): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15047 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2759.373478] audit: type=1326 audit(1713661928.696:18560): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15047 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2759.376063] audit: type=1326 audit(1713661928.696:18561): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15047 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2759.378424] audit: type=1326 audit(1713661928.696:18562): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15047 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2759.380716] audit: type=1326 audit(1713661928.696:18563): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15047 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:12:08 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2759.406387] blktrace: Concurrent blktraces are not allowed on loop8 [ 2759.423956] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2759.423956] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2759.423956] [ 2759.460101] blktrace: Concurrent blktraces are not allowed on loop8 [ 2759.485030] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2759.485030] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2759.485030] [ 2759.486862] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2759.489382] EXT4-fs (loop6): get root inode failed [ 2759.490173] EXT4-fs (loop6): mount failed [ 2759.509003] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2759.518714] EXT4-fs (loop5): get root inode failed [ 2759.519717] EXT4-fs (loop5): mount failed 01:12:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x80200, 0xe0) fsmount(r1, 0x0, 0x9) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:12:23 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:23 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:23 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:23 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet(0x2, 0x5, 0x686) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, &(0x7f0000000040)={0x6, 0x18, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0]}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:12:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x60, &(0x7f0000000380)={'trans=unix,', {[{@dfltuid}, {@cachetag={'cachetag', 0x3d, 'veth0_to_bridge\x00'}}, {@access_any}, {@fscache}, {@nodevmap}, {@cache_none}], [{@pcr={'pcr', 0x3d, 0x8}}, {@fowner_gt}, {@smackfsroot={'smackfsroot', 0x3d, 'nl80211\x00'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}}) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x82, 0x0) getsockopt$sock_timeval(r4, 0x1, 0x636fcae3e93af18c, &(0x7f0000000240), &(0x7f0000000280)=0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:12:23 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2506000000840106804800040067636d286165732900000000000000000000000000000000000000000000000020000000d240dd0383eb996ca62cfd8227984706cb90dd8417df05e749edd24dd19787474800040067636d286165732900000000000000000000000000000000000000000000000020000000ed9f2201bdca8c7176291e256b57814fb9d77e9ee31fb31f0b658f579079e65c3d00040067636d2861657329000000000000000000000000000000000000000000000000150000001ce398497f37d90cb72c4085a1e7da127e6325c900000000a9000300b31b484a5f222726888d078b26c3ce73ceec480da079fa8ff4be961df08ece710b230b5233aee6f7372d6dbd2bd1d5099488f3f0234e40a52edfd40e28f1eb8b38b0fd5c6d0fc0c6606841d8e18256b3a2203245aa4db8712c99e9fe73ca30e935a28012f3c63e612f7b635c6b039d3e26d96d93ed127427e69437e1650c2c418a69c2502c331419b2c8df03c26e59ed57f34f9b5e5aa1df94a610e0a2ba028ab7bc2722af00000004000200180004801300010062726f6164636173742d6c696e6b00000c0003800800030095ffffff7c000580240002800800010017000000080001000300000008000300ffffff7f080004000800000044000280080003000100008008000200020000000800020073c5ffff08000200010000000800040007000000080004007b6e000008000100180000000800020005000000080001006574680008000100756470005400038008000300b2000000080003000000010008000200010000000800010081000000080002003f000000080001000600000008000200ffff0000080001000600000008000300000000000800020006000000700002800400040008000100000100000800020002000000080002000300000008000200030000002c00038008000200000000000800010005000000080002003f00000008000200990a000008000200000400000c0003800800020081ffffff08000200ffffff7f08000100cc2d6a6e"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:12:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc04812ba, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2774.399824] kauditd_printk_skb: 98 callbacks suppressed [ 2774.399845] audit: type=1326 audit(1713661943.806:18662): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.423733] audit: type=1326 audit(1713661943.829:18663): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.434497] audit: type=1326 audit(1713661943.829:18664): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.451271] audit: type=1326 audit(1713661943.830:18665): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.460180] blktrace: Concurrent blktraces are not allowed on loop8 [ 2774.466113] audit: type=1326 audit(1713661943.830:18666): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.480989] audit: type=1326 audit(1713661943.837:18667): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.488638] audit: type=1326 audit(1713661943.837:18668): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.494899] blktrace: Concurrent blktraces are not allowed on loop8 [ 2774.519235] audit: type=1326 audit(1713661943.837:18669): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2774.535283] audit: type=1326 audit(1713661943.838:18670): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:12:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240), 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/183, 0xb7}, {&(0x7f0000000000)=""/22, 0x16}], 0x2, &(0x7f0000000600)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100030001000000f7e55e7d", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="000000001c000006e6c59e1c2f774b664c7e73038910000000000001002000020000001b389d981f06280df240bc590ae40998373606685c9045d30ba61b5f41408eb5e2", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x80}, 0x3) faccessat2(r5, &(0x7f0000000480)='./file0\x00', 0x81, 0x200) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x8, 0x5) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2774.563167] audit: type=1326 audit(1713661943.838:18671): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15080 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:12:23 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2774.596330] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2774.596330] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2774.596330] 01:12:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6c4193d1037695c21699b8bb347c6e89976654bac43eb86858b6b44d9cb269cae03e5ad3fb1dd700c6ee01404b0092fa179f03da25b8d24618103accd64195b5934091533e19e428166d4ecd8b253e301769e33cdcb572"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:12:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2774.632927] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2774.632927] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2774.632927] 01:12:24 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0x9}, {0x5, 0xfffffff9}], r1}, 0x18, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x180080, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d756e69782c616669643d3078303030303030303030303030303030392c616e616d653d3a2a2f2d3a26227d283a267f0ae1b6729529ac683818d80f0d42e526282c636196380b642a11f4c9b6c2d41ba9221ee632e90852ca6043a23157490a09e7074b9643b480e417e6f00f240e074f7f20de45", @ANYRESDEC=r1, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2774.654318] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2774.654318] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2774.654318] [ 2774.662298] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2774.668259] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2774.670792] EXT4-fs (loop0): get root inode failed [ 2774.671612] EXT4-fs (loop0): mount failed [ 2774.684182] EXT4-fs (loop6): get root inode failed [ 2774.685037] EXT4-fs (loop6): mount failed [ 2774.723092] blktrace: Concurrent blktraces are not allowed on loop8 [ 2774.727100] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2774.759543] EXT4-fs (loop5): get root inode failed [ 2774.760996] EXT4-fs (loop5): mount failed [ 2774.764624] blktrace: Concurrent blktraces are not allowed on loop8 01:12:24 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x466, 0x82000) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000003e003500000070e5fedbdf25040000000800880000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x800) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:12:24 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2506000000840106804800040067636d286165732900000000000000000000000000000000000000000000000020000000d240dd0383eb996ca62cfd8227984706cb90dd8417df05e749edd24dd19787474800040067636d286165732900000000000000000000000000000000000000000000000020000000ed9f2201bdca8c7176291e256b57814fb9d77e9ee31fb31f0b658f579079e65c3d00040067636d2861657329000000000000000000000000000000000000000000000000150000001ce398497f37d90cb72c4085a1e7da127e6325c900000000a9000300b31b484a5f222726888d078b26c3ce73ceec480da079fa8ff4be961df08ece710b230b5233aee6f7372d6dbd2bd1d5099488f3f0234e40a52edfd40e28f1eb8b38b0fd5c6d0fc0c6606841d8e18256b3a2203245aa4db8712c99e9fe73ca30e935a28012f3c63e612f7b635c6b039d3e26d96d93ed127427e69437e1650c2c418a69c2502c331419b2c8df03c26e59ed57f34f9b5e5aa1df94a610e0a2ba028ab7bc2722af00000004000200180004801300010062726f6164636173742d6c696e6b00000c0003800800030095ffffff7c000580240002800800010017000000080001000300000008000300ffffff7f080004000800000044000280080003000100008008000200020000000800020073c5ffff08000200010000000800040007000000080004007b6e000008000100180000000800020005000000080001006574680008000100756470005400038008000300b2000000080003000000010008000200010000000800010081000000080002003f000000080001000600000008000200ffff0000080001000600000008000300000000000800020006000000700002800400040008000100000100000800020002000000080002000300000008000200030000002c00038008000200000000000800010005000000080002003f00000008000200990a000008000200000400000c0003800800020081ffffff08000200ffffff7f08000100cc2d6a6e"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:12:24 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2774.927317] blktrace: Concurrent blktraces are not allowed on loop8 [ 2774.937008] blktrace: Concurrent blktraces are not allowed on loop8 [ 2774.939953] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2774.939953] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2774.939953] [ 2774.979358] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2774.983639] EXT4-fs (loop0): get root inode failed [ 2774.984374] EXT4-fs (loop0): mount failed 01:12:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:12:39 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc66, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x5, @private1, 0xffffffff}, 0x1c) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:12:39 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:39 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:39 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:39 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000001000000180000000623f87a573d124fe83f9a555c4517a0cc8d1ac3987564c86bfabba79957dcb237efeec99e0604ba8de304d43c90ffa4c77826b28be2229ad7bccd454de7407f5120cc23601aa2cef3226b7df7f31b290aba9d2c8f2384fcea038b5bf1b8e183fa84f71b298f293bdc37c9d3d5e27e96a3d3f964e8ce0e48916be268", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:12:39 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:12:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x104) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2790.588737] kauditd_printk_skb: 158 callbacks suppressed [ 2790.588757] audit: type=1326 audit(1713661959.995:18830): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.597111] audit: type=1326 audit(1713661960.003:18831): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.605259] blktrace: Concurrent blktraces are not allowed on loop8 [ 2790.608736] audit: type=1326 audit(1713661960.004:18832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.617908] blktrace: Concurrent blktraces are not allowed on loop4 [ 2790.623971] audit: type=1326 audit(1713661960.004:18833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.633915] blktrace: Concurrent blktraces are not allowed on loop8 [ 2790.642932] audit: type=1326 audit(1713661960.004:18834): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.658469] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2790.658469] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2790.658469] [ 2790.672834] audit: type=1326 audit(1713661960.004:18835): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.676308] audit: type=1326 audit(1713661960.004:18836): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.680317] audit: type=1326 audit(1713661960.004:18837): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15153 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2790.684251] audit: type=1326 audit(1713661960.011:18838): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15154 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 01:12:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000001004000180000007f1ce40315c51e000296", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe5016a8f2000000002e2f66696c65300057b6d84dc870092c61bd6cc19b390376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2790.687716] audit: type=1326 audit(1713661960.011:18839): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15154 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2790.699615] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2790.702532] EXT4-fs (loop0): get root inode failed [ 2790.703343] EXT4-fs (loop0): mount failed 01:12:40 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) r4 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r4, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:12:40 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2790.792354] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2790.792354] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2790.792354] [ 2790.799316] blktrace: Concurrent blktraces are not allowed on loop8 [ 2790.812187] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2790.812187] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2790.812187] [ 2790.835165] blktrace: Concurrent blktraces are not allowed on loop8 [ 2790.837315] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated 01:12:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2790.848289] EXT4-fs (loop5): get root inode failed [ 2790.849383] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2790.849977] EXT4-fs (loop6): get root inode failed [ 2790.851306] EXT4-fs (loop5): mount failed [ 2790.852147] EXT4-fs (loop6): mount failed 01:12:40 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000000)=0x40, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:12:40 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2790.960791] blktrace: Concurrent blktraces are not allowed on loop4 01:12:40 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) r2 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2790.984764] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2790.984764] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2790.984764] [ 2791.017520] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2791.020090] EXT4-fs (loop0): get root inode failed [ 2791.020909] EXT4-fs (loop0): mount failed 01:12:40 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:40 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:40 executing program 3: sendmsg$DEVLINK_CMD_RATE_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x5c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8801) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x69, r4}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:12:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x4d, 0x5, 0x0, 0x0, 0xc155, 0x22, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20, 0x3f8000000000000, 0xfffffffa, 0x1, 0x10000, 0x4, 0x9, 0x0, 0x1, 0x0, 0x8}, r0, 0xc, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="131fc82147196ce5ea55d39dd800f7d4db8bcc1f", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000001c0)={@local, 0x5c}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x46, 0x3, 0x9b, 0x6}) [ 2791.082983] blktrace: Concurrent blktraces are not allowed on loop8 [ 2791.115459] blktrace: Concurrent blktraces are not allowed on loop8 [ 2791.190848] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2791.190848] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2791.190848] [ 2791.210086] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2791.213833] EXT4-fs (loop5): get root inode failed [ 2791.214849] EXT4-fs (loop5): mount failed [ 2791.226265] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2791.226265] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2791.226265] [ 2791.242343] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2791.246883] EXT4-fs (loop6): get root inode failed [ 2791.247956] EXT4-fs (loop6): mount failed 01:12:54 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:54 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2804.740300] kauditd_printk_skb: 231 callbacks suppressed [ 2804.740319] audit: type=1326 audit(1713661974.147:19071): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15227 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2804.751850] audit: type=1326 audit(1713661974.157:19072): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15227 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2804.785840] audit: type=1326 audit(1713661974.158:19073): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15227 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:12:54 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) r2 = openat(r1, &(0x7f0000000100)='./file0\x00', 0x202000, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) connect$inet(r2, &(0x7f0000000080)={0x2, 0x8, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) fcntl$setlease(r1, 0x400, 0x2) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:12:54 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xee, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000b3be2c12fa0230930f201f6dff48000600000000000000007622f8b4c00d6a6543c11ff6a54f98e17de12f6b6a28a54a6d6827227245be22d72268b21b14e6cf3f94e27c0bd4070afc5f19883ed12c58dd9e9281ca2b86fe6b93a21e027c1d6e81c34ca3f9ae2a5776bb906d1f2cd079472d900af17341253f7a0e66c2b1c589e787b1a9c058099cff7ad2e942b05af72b9a1ec2f5620798bebdb513b3221db9aa0c43d2f950ded866f382018d3f09b5b1fb1e6d921d4724fa441c87c1d2af99c6d06825c5963dee9e4f997b95f2bf721dfc374421a2ec76a18018beacf4ede069ea35f65834c45d904278abaf8e52a35d5fe85ef20777644a7a4d6b2bbb7f67977ffbc6e2", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) setsockopt$SO_BINDTODEVICE_wg(r6, 0x1, 0x19, &(0x7f0000000240)='wg0\x00', 0x4) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'wg2\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:12:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:12:54 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x47040, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:12:54 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) r2 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2804.802195] audit: type=1326 audit(1713661974.158:19074): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15227 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2804.817936] audit: type=1326 audit(1713661974.159:19075): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15227 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2804.832241] blktrace: Concurrent blktraces are not allowed on loop4 [ 2804.832306] audit: type=1326 audit(1713661974.181:19076): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15236 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2804.837545] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2804.837545] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2804.837545] [ 2804.846495] audit: type=1326 audit(1713661974.181:19077): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15236 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2804.850084] audit: type=1326 audit(1713661974.181:19078): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15236 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2804.856062] audit: type=1326 audit(1713661974.182:19079): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15236 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2804.859643] audit: type=1326 audit(1713661974.183:19080): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15236 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:12:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) unlink(&(0x7f0000000080)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2804.870841] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2804.874234] EXT4-fs (loop0): get root inode failed [ 2804.875073] EXT4-fs (loop0): mount failed [ 2804.952863] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2804.952863] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2804.952863] [ 2804.971468] blktrace: Concurrent blktraces are not allowed on loop8 01:12:54 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:12:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2804.998634] blktrace: Concurrent blktraces are not allowed on loop8 [ 2805.011748] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2805.036938] EXT4-fs (loop6): get root inode failed [ 2805.038263] EXT4-fs (loop6): mount failed 01:12:54 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2805.069852] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2805.069852] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2805.069852] [ 2805.094823] blktrace: Concurrent blktraces are not allowed on loop4 [ 2805.098937] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 2805.105196] EXT4-fs (loop5): mount failed [ 2805.118467] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2805.118467] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2805.118467] [ 2805.143322] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2805.145543] EXT4-fs (loop0): get root inode failed [ 2805.146824] EXT4-fs (loop0): mount failed 01:13:07 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:13:07 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2817.795637] kauditd_printk_skb: 110 callbacks suppressed [ 2817.795649] audit: type=1326 audit(1713661987.202:19191): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15287 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2817.801330] audit: type=1326 audit(1713661987.208:19192): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15287 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2817.803964] audit: type=1326 audit(1713661987.210:19193): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15287 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2817.805963] audit: type=1326 audit(1713661987.211:19194): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15287 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 01:13:07 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000500)='ext2\x00', 0x44022, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, @perf_bp={0x0}, 0x0, 0x8001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x9dc, @local, 0x5}, 0x1c) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x45, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x2, 0x9}, 0x10000, 0x3, 0x1004, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:13:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xd000, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x10, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd814, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x8, 0xfffffffb, 0x0, 0x0, 0xffffffff}, 0x0, 0xa, r4, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r5}}, 0x73) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x3, 0x0, r4, 0x0, r2, 0x2, 0x0, 0x0, {0x0, r5}}, 0xfffffffe) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:13:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x48, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:13:07 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2817.813452] audit: type=1326 audit(1713661987.213:19195): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2817.821771] audit: type=1326 audit(1713661987.213:19196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:13:07 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000000) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x4000000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000100)=[r1, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1, r3], 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0x0, r4, 0x2007, 0x80, 0x1, 0x9}) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2817.827805] audit: type=1326 audit(1713661987.213:19197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2817.840986] blktrace: Concurrent blktraces are not allowed on loop8 [ 2817.843361] blktrace: Concurrent blktraces are not allowed on loop4 [ 2817.847091] blktrace: Concurrent blktraces are not allowed on loop8 [ 2817.852256] audit: type=1326 audit(1713661987.213:19198): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2817.855655] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2817.855655] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2817.855655] [ 2817.863288] audit: type=1326 audit(1713661987.213:19199): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2817.871077] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2817.872409] EXT4-fs (loop6): get root inode failed [ 2817.872875] EXT4-fs (loop6): mount failed [ 2817.876976] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2817.876976] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2817.876976] [ 2817.884425] audit: type=1326 audit(1713661987.213:19200): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15283 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2817.922130] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2817.929573] EXT4-fs (loop0): get root inode failed [ 2817.930321] EXT4-fs (loop0): mount failed 01:13:07 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2817.939247] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2817.939247] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2817.939247] [ 2817.967193] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 2817.967928] EXT4-fs (loop5): mount failed 01:13:07 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000240)={@local, 0x5c}) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x3, 0x7f, 0x40, 0x0, 0x4, 0x20, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x10, 0x7ff, 0x2, 0x4, 0x2, 0xffffffff, 0x2, 0x0, 0x80000000, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:13:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) write(r3, &(0x7f0000000240)="0bc9ee53d260410133363079ef375b523f085a100e95fcef60e07186abb7bfc076d11f551bb3f9ad4fd48fa545aef76cc8783196911a6f27e6c8f97b335e0b489f2d6560ebfcef22c35c3420745f35ad182dce2ab87368", 0x57) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:13:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2818.028655] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2818.028655] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2818.028655] 01:13:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@local, 0x5c}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x1f, 0x3, 0x81, 0x0, 0x5, 0xc, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000080), 0xb}, 0x104, 0xffffffffffffd564, 0x80, 0x3, 0x5, 0x1, 0x1000, 0x0, 0x294, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x1) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r3 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000200)='./file0\x00', 0xa700001a) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x4000000) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYRESDEC=r1, @ANYRESDEC=r2, @ANYRESDEC, @ANYRES16=r0, @ANYRESHEX, @ANYRESDEC=r3, @ANYRES32=r4, @ANYRES64, @ANYRESHEX=r3]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:13:07 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2818.061056] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2818.062217] EXT4-fs (loop6): get root inode failed [ 2818.062971] EXT4-fs (loop6): mount failed 01:13:07 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2818.112913] blktrace: Concurrent blktraces are not allowed on loop8 01:13:07 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:07 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2818.163681] blktrace: Concurrent blktraces are not allowed on loop4 [ 2818.173919] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2818.173919] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2818.173919] [ 2818.197661] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2818.197661] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2818.197661] [ 2818.221227] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2818.233589] EXT4-fs (loop0): get root inode failed [ 2818.234502] EXT4-fs (loop0): mount failed 01:13:07 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xfca7, 0x0, 0x32cc443, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2818.237686] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 2818.238285] EXT4-fs (loop5): mount failed [ 2818.276843] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2818.276843] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2818.276843] [ 2818.316209] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2818.317500] EXT4-fs (loop6): get root inode failed [ 2818.317959] EXT4-fs (loop6): mount failed 01:13:21 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'team_slave_1\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:13:21 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:21 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) r1 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:13:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x68, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:13:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="feffffff0100000018000000", @ANYRES32, @ANYBLOB="95ba0000c1d3f9fbbb005dea873cfe000000002e2f66696c6530000376"]) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x40, 0x100, 0xb91, 0x7f, 0x9, r2}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:13:21 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2832.141244] kauditd_printk_skb: 232 callbacks suppressed [ 2832.141261] audit: type=1326 audit(1713662001.547:19433): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2832.145474] audit: type=1326 audit(1713662001.548:19434): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2832.148794] audit: type=1326 audit(1713662001.548:19435): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 01:13:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}, 0x281, 0x8000, 0x0, 0x8, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0100000000003d7c0000050000000c00010200000000599f94db8b37c74ef8f0319f4e74e334582336f8b44fe6294c2e0923143fb47ec7b78f330a478654fcc4040cc86e5790371ad36cbe7ead2d0f778406401c06fc03c297a7f9c8670689728a0ac2aa0ba4e9057ba343b10cce", @ANYRES32=0x0, @ANYBLOB="10000380080002000000000004000400"], 0x30}}, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000002c0)={@local, 0x0}, &(0x7f0000000300)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(r6, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x805}, 0x4010001) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) r8 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x8, 0x0, 0x7, 0x0, 0x0, 0xf8ef, 0x200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x40800, 0xfffffffffffffffb, 0x7f, 0x2, 0xfffffffffffffffb, 0x7fffffff, 0x400, 0x0, 0x1c0000, 0x0, 0x1000}, 0xffffffffffffffff, 0x3, r0, 0x9) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc09e, 0x0, @perf_config_ext={0x6000000000000000, 0x401}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffab}, 0xffffffffffffffff, 0xffffffffffffffff, r8, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f0000000600)=@routing={0x5e, 0xe, 0x0, 0x81, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0x2d}, @private1, @private0={0xfc, 0x0, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @private=0xa010101}]}, 0x78) [ 2832.169857] audit: type=1326 audit(1713662001.567:19436): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15371 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2832.183856] blktrace: Concurrent blktraces are not allowed on loop4 [ 2832.186141] audit: type=1326 audit(1713662001.567:19437): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15371 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 [ 2832.197901] blktrace: Concurrent blktraces are not allowed on loop8 [ 2832.201352] audit: type=1326 audit(1713662001.568:19438): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2832.209049] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2832.209049] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2832.209049] [ 2832.216462] audit: type=1326 audit(1713662001.568:19439): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2832.230420] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2832.230420] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2832.230420] [ 2832.237940] audit: type=1326 audit(1713662001.569:19440): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2832.241394] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2832.245122] EXT4-fs (loop0): get root inode failed [ 2832.245308] blktrace: Concurrent blktraces are not allowed on loop8 [ 2832.245880] EXT4-fs (loop0): mount failed [ 2832.256596] audit: type=1326 audit(1713662001.569:19441): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 01:13:21 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2832.270518] audit: type=1326 audit(1713662001.569:19442): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15368 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2832.270890] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2832.286673] EXT4-fs (loop6): get root inode failed [ 2832.287428] EXT4-fs (loop6): mount failed [ 2832.332955] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2832.332955] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2832.332955] 01:13:21 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1002, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) setsockopt$inet6_group_source_req(r5, 0x29, 0x2f, &(0x7f0000000240)={0x4be63416, {{0xa, 0x4e21, 0x4, @empty, 0x6}}, {{0xa, 0x4e21, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0xffff0001}}}, 0x108) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:13:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:13:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0320005702d3f9fba5245deac697e52a0b9685486b04873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:13:21 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2832.375427] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2832.388138] EXT4-fs (loop5): get root inode failed [ 2832.389268] EXT4-fs (loop5): mount failed [ 2832.434223] blktrace: Concurrent blktraces are not allowed on loop8 01:13:21 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2832.449747] blktrace: Concurrent blktraces are not allowed on loop8 [ 2832.460232] blktrace: Concurrent blktraces are not allowed on loop4 [ 2832.470839] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2832.470839] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2832.470839] 01:13:21 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000000)={'veth0_to_hsr\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:13:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r1, 0x8010661b, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000020c1d3f9fba5455dea873cfe00008135a88e2b9a8062300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2832.536889] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2832.540769] EXT4-fs (loop0): get root inode failed [ 2832.541534] EXT4-fs (loop0): mount failed 01:13:21 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2832.604952] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2832.604952] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2832.604952] 01:13:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x74, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:13:22 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:22 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2832.649241] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2832.666658] EXT4-fs (loop6): get root inode failed [ 2832.667437] EXT4-fs (loop6): mount failed [ 2832.698030] blktrace: Concurrent blktraces are not allowed on loop4 01:13:22 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2832.720738] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2832.720738] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2832.720738] [ 2832.743033] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2832.752047] EXT4-fs (loop0): get root inode failed [ 2832.752785] EXT4-fs (loop0): mount failed [ 2832.816340] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2832.816340] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2832.816340] [ 2832.866879] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2832.874976] EXT4-fs (loop5): get root inode failed [ 2832.876336] EXT4-fs (loop5): mount failed 01:13:35 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2845.918108] kauditd_printk_skb: 198 callbacks suppressed [ 2845.918127] audit: type=1326 audit(1713662015.325:19641): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15451 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:13:35 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:13:35 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:35 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="01000000000000b96956ad5b3ba0a5e6"]) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x0, @initdev}}) r6 = openat(r4, &(0x7f0000000100)='./file0\x00', 0x10000, 0x22) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000070100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b60400c870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000000280)={0x0, @aes256, 0x0, @desc4}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) sendfile(r7, r0, &(0x7f00000000c0)=0x28f6, 0x417) 01:13:35 executing program 0: flock(0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x8000, 0x0, 0x8, 0x0, 0x40, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40082, 0x19) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000000)=""/9, 0x9, 0xc0010042, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2845.929189] audit: type=1326 audit(1713662015.333:19642): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2845.937922] blktrace: Concurrent blktraces are not allowed on loop8 [ 2845.940147] blktrace: Concurrent blktraces are not allowed on loop4 [ 2845.950592] audit: type=1326 audit(1713662015.333:19643): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2845.953962] audit: type=1326 audit(1713662015.336:19644): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2845.957971] blktrace: Concurrent blktraces are not allowed on loop8 [ 2845.975326] audit: type=1326 audit(1713662015.336:19645): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2845.980808] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2845.980808] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2845.980808] 01:13:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x2f00b150, 0xd105, 0x9}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2845.992222] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated 01:13:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'rose0\x00'}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r7}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x45, 0x9, 0x0, 0x0, 0x0, 0x80002, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x81}, 0x1141, 0x3, 0x4, 0x2, 0x400, 0x3, 0x9, 0x0, 0x7ff, 0x0, 0x2000000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2845.999679] audit: type=1326 audit(1713662015.336:19646): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2846.003635] EXT4-fs (loop0): get root inode failed [ 2846.004361] EXT4-fs (loop0): mount failed [ 2846.004453] audit: type=1326 audit(1713662015.340:19647): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2846.008973] audit: type=1326 audit(1713662015.340:19648): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2846.011331] audit: type=1326 audit(1713662015.340:19649): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15455 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2846.014107] audit: type=1326 audit(1713662015.340:19650): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15451 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2846.053621] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2846.053621] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2846.053621] [ 2846.085885] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2846.085885] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2846.085885] [ 2846.090596] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2846.092965] EXT4-fs (loop6): get root inode failed [ 2846.093744] EXT4-fs (loop6): mount failed [ 2846.128066] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 2846.135675] EXT4-fs (loop5): get root inode failed [ 2846.136823] EXT4-fs (loop5): mount failed [ 2856.127793] kworker/dying (5471) used greatest stack depth: 23504 bytes left 01:13:50 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000050000000c00018008000100", @ANYRES32=r4, @ANYBLOB="6ddcef208e34821830761406d027ab19ebac3cadb6643e21132766b25e9bfcc8c351cab683461502a58d07b4ef9d660fe5614e5dcb2120e376463e89db79f0a819a8e1484afd8998a85599b529"], 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_to_bridge\x00'}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r8}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:13:50 executing program 1: sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9985570e95b83b7a9aa93a28b987f7960de032b11f480009b4", @ANYRES16=0x0, @ANYBLOB="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"], 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000a891) r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:13:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:13:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:50 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:50 executing program 7: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000001800)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) sendmmsg$sock(r1, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000240)="b6e2e1e903742067560191bd50150597dbf3140946fddac8ab7c44cdd2a9f26abe00834c847befafb2b83798ad3079a61a9329420d36d80eb09c8f26eefe803c022cc6d814bedc90c6dc3c4556db318f2da26369ef6e002a617a3b12ce125e398fdb6232", 0x64}, {&(0x7f0000000000)="c10172909ef84a33138ad576253dede0df54445a7520", 0x16}, {&(0x7f00000002c0)="7bbb63af33909574cada35eb055054ef087a42bb21023935ec085bf3b5547d74f4151b3437d28bed031683356d51f0ccb94f13688002162be09552d146d5d3675fa0066fe8e465bc42922f6441d60cad067c155c0d25fa45a2ddf99699aa3e8a1ff2b57235bd90519560045c7e6fb64b9417360f4e32c5be31c7e9b874c14cc5996154f381fec644722a1f2ef2704fdbdb87013705b76dceb72b913602fe0d72605425aa9b616c01ae73", 0xaa}, {&(0x7f0000000380)='1', 0x1}, {&(0x7f00000003c0)="ec65e338806b11720e", 0x9}], 0x5, &(0x7f0000000540)=[@mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffc1}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x400}}, @timestamping={{0x14, 0x1, 0x25, 0x98}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0xc0}}, {{&(0x7f0000000600)=@hci={0x1f, 0x3, 0x2}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000680)="26e0e6a25fb3dbc62e0610e71867c8b30bf73fae2e5524139b9931ca0fc41300099d6b45aea01a71226b77021c8bef2979b937a6404197af4d77397ebe89665be9a3d765bb3cf7264d5ab294b1907fbcd8e86aa5d58018130550220204", 0x5d}, {&(0x7f0000000700)="07b1aa2dfa158c7411c65f4ef87205c7c1b9bfc5f27f58352e0fd3165c16f3f2566739b665291ec8e8bd24e4df0e9e94929c3dfcdaa7910650c90b0b1f5b7e3615681428545192cea9ad4c5b89e4cc064c6844701cae79ac090caf79f5ba0282c5683767f57dfccab29377487f66bf21a1bbca1c5092e983b05bddc08f47809a4c9bb7ad6aab23e4856cf5ee6e9ff8624c9b0da923603d73b7b9d4e9ed0001ff16f9d1e686970bce90e6a890acfc70908669ed1c7b6d63775654f50e685569f47ae30bfe8abf1c0150e1ef0cfc9ef1b563728cd945d80194ac353a8a61551aca8babdb", 0xe3}, {&(0x7f0000000480)='C', 0x1}, {&(0x7f0000000800)="7083b1d1143bd20fe1c5459b913c80c27b7e925b0b3a1f881bfa3b494af249f0567356f3f3bd26c3d3ad67300195d0057bb4cc6d671be3f5f09151df836fb9637c240728cf4305bee83bcc910ab41aba03fab7476e3f9b0285216296ea2435b50ae218cc61fa4c7176392299f36fc84047f6991304bfbcbf9d02006d44dab0668a1f30404e19b8d5b66a2cb4afc4b46a08399545ff2176953dc9e2950514a2de4e4e106b22079c84a16e1b38634f75bc6ff3fbe1ff4d87f7366e16250fb1e978ba059e2709ed64fa325151980a1abce7f3b4f6d3bbb8f1da646dbb5075779b87c9d8d920c01ba8b32d4fcb", 0xeb}, {&(0x7f0000000900)="a62949f72a6ad7837c0fbb246c3c4ced97ed30d0cc60e9c718f643c4a2d35b91049f1dc6d9ae2f3b1cb8b240782162bf4291a994e55a0f16325f364950605de68c7abb65376af4fc5a9108814e81a1240148079740bb96e0d41a9c31d3e88ed0e6f2e13bae6e84b9e6dd23a378c4b7570fcc4fb58a3703472705a75aa17baaef7458b70ecd5ab069abf79f714fae0e0535288e3f699fdbc5787b858f8159a373e9837de7362432a480f28b1c944b7c9882d84fe84834d992beb3921770749c56ddaeea6da98ea13870b0ac", 0xcb}, {&(0x7f0000000a00)="070cfdc118f8d8c8e74cb5cb68531d8fd119bd99f1afc0a0a9cf569b6127cf4d63bcad3430731ab6f55d74bcf7b500a5d325d37847591f59bb0db7606197fbef5137389b17b79622cd241f8ab9df85a9af04a76cd61dd0ce5f00c0eadcca5bada1ec78ad2fcac34a3eb6a40ad52daedc99b814389f11ea4f4f8afa3d5ec0086c61adc87c87b703291f576fe76b4e5a50164e5a3cd268ed5b86228cb0645a3317f2cdbb5775930dc2a956c9c8a2", 0xad}, {&(0x7f0000000ac0)="0037198b4be1109571", 0x9}], 0x7, &(0x7f0000000b80)=[@txtime={{0x18, 0x1, 0x3d, 0x40}}], 0x18}}, {{&(0x7f0000000bc0)=@caif=@rfm={0x25, 0x3ff, "44df0bb1dd5aadd0bbbfbb690dd66f05"}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000c40)="841006673763692e58ad9eff965286d2072fb773759443d5f5ae5a98d10be790023a0b88eea9e7eacf8fb31dd04c44b8b20cdc88a30b53cd68c06269817f48b821ef0eba62a50c068edb7f121727b66dc5b81ad86cf3b185da4a05b9760421c757c44261579259cf7ccf5e3ec7f4a78f13989670541c56f9d004955b997c62717545dabcc4faf23b2d6266c85ed46b61269d7e0330910978917e24533440dd107932aa6bf83d278c", 0xa8}, {&(0x7f0000000d00)="3807d61273b122dbad9c672b0cd78aa63ead3b8a0c9ec9d7229f18d074062d8ea8f76dd91d4f413dfec60f7b091b8ba0c943c8c31f303c20aca382068c4f4301d3fa6e9b2f0378f6bd72693601f2884375452712491d1644b18fda579ae0bffdd5af4eb8a257f294c04e15870ca61c64f50f63a13b5d3e32fe9b7a3c9d7670584a0c2ac3f65e5deb7534e54959397e9eb953f9db842152e8a2001e90e34fc264d55305fc2fef4522b33b5431289ad9581794ef769eb6fa92ac961f", 0xbb}, {&(0x7f0000000dc0)="4ee65b9624ee8f70e6657ad2073e4e8f2ad76b3b890ca067dc80e2251f84a9165fd5af18326d113215efaa12605c1a0b7bc622769204df7cdc93dc77ed88bf7836524a27ad87362fd2edb822589fbe88187ff371a3eec90ad4efffcc26210a928139aae51912a8dd6d28d7e289f59ad0b4cf7b20a49ca3e1997ff3a2d0e4a9b7f72459dd7b68d50a808caaa6e1e0c695bca5af9b76f653332d974e2c59d4845b439f91cf81f97b37789d663e403eb2cdf7b1cb9006c44baf1a9ceb8916b8f14bb01d9c0f9aae834bf2b055cede7a1f4262de4c2ad7f6d1f81e74c2a2b3894ffb8ac27dc404d63631f20da75d692b6752548ac0acb9ad", 0xf6}], 0x3}}, {{&(0x7f0000000f00)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x2, 0x1, 0x0, {0xa, 0x4e21, 0x1, @empty, 0xffffffff}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000f80)="8f0140d051501e66eaf68b8ddd492cffca9896b5ffcf2872630a7ef0c84e4875dffa7234444a7c271c8ee65746e719320262a144441b221ff10e27dcd227478b87edb829ecd2d4c522fd367c2d4f8c06c3415f9cb084ac487628dc4b5999bb8be207b4ec84e8cd6e0af451f4ac86adeaa8750fda34b55766ab0e02814dcd5a8e98440e9b3c7f0eb445df5ca0a9386924138dec1862fb051fd37cec7a6165d2badfbf6c9e54d8d46bc9624336d9bbc607fa49eedbe72bd8b57cd83eff07a4d64df44c76a39d81b5030c264f293a0f655b0474d5b6fb6f9fb12aa63b2de8510c551fbc006c08827d776becd0", 0xeb}, {&(0x7f0000001080)="2a74134eb6f1a3386d132b8c7cfc9aa09304621094e664437e5c3dafce4e1c5c2b90dad524f40ba6814700c34ea322ccc0cab6c42a434b1f55f269b1f1d987ed3dd8e6c660ed064b89cab747655193cff3b999dee3846a649fcb3650e4d6f5059459bd9ddc623b4c2eefd09ec358f2bf546c82a0d43b139d0d6cc0ac7a27720621f1bbb5f46d0fdd888cf6237444664f7477f57c650ea75ad762f82d48ad6667df036b056de57dc574a985f9aed7c14dd50c05ac0de0bb32e0aed7cba14658dccea7c45f4c164535b99b008607f2d150b11a3b27e13c0841005c11bf77cfcf899e5285", 0xe3}], 0x2, &(0x7f00000011c0)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffff8}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x78}}, {{0x0, 0x0, &(0x7f0000004540)=[{&(0x7f0000001240)="3be6fc9cb9cecb1dc6cbd9fb6c32c3789457c2bd0eb54ef9c09f77c936551d3c44cd6ee5ae913a8ffbd60aadd1d1827e0cb0290b1e399d3c0d3d8f3e98233232842514d069ba98aa4105a22ea26235b411c13d97a8fa", 0x56}, {&(0x7f00000012c0)="1311b266dd430772e3", 0x9}, {&(0x7f0000001300)="af1a3b0556f0235bfe6d2eb25ab319e55c2ba0a21fbf1e041955d30b3c1070763f9d4275bb7b01ec2ee938b78b04a41add7abb2c7f", 0x35}, {&(0x7f0000001340)="96c1a92aca79c8711f091bd4aef266f0232f5ab7528a97a7bb76dc274d53984d6549bd64677b56d6b416fae01368b0ae794cd0ff12a3c490527bb4787e3a59904a0215f25fa7ab6b1340c59c2a1736969308265cf19205472ea481532465e73ef83773bb4531fb0dea55253d0f3edf4f0db1c12f0f51c6fffd04a4d88dd2d3455b0eaaa46c0d3f954cb5569d97ed6c16acf9babefad17b0cfebb749f60310f21a6877eedab6154b25967858e1a92aefb99903ab5029d80bc3a568c8d6b7ab67c5954d9ed7ed4692324f629ae9c1774c2fbc4a74af03f8e3c04fe", 0xda}, {&(0x7f0000001440)="e7cbf97ff379d434a2b4dc33ff4e6d63ea75e32f5ca0f3602e792267182430b39361c74d1bf0844055bceb802e0d8a20", 0x30}, {&(0x7f0000001480)="bd1a2b0dca96af1955f6ff206907b004cd866aa7e6415b356a14699b7bbad63822a15c5b71d43c0351db890002052466a3e75bad879f9ae70497e104edf62fd6f558aa6fc9c29fd9b4c1a72c7c2e823c047886ebd0", 0x55}, {&(0x7f0000001500)="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", 0xfe}, {&(0x7f0000001600)="cf96551ee31ea66b5e30d8766741d375d22db423c17ed0dd093d5a22f2cabddda810c06abc667d8b6c23099aad3ba5c7bc68552fe43757fe3c8b76935035323fd2b9b0f7728005e226e5cc2a83a9d124666d9a1b5b4f3565a5220cc1104949849c6eb3476dfa4271291fdb73779e54532c31aa293aac43f6ea76553eefd12fd4c7bc4eb5927df9c29bf6034735e1ecdceb32593eb2ff5e24faebab8b53f2195400fe271eab9d1c295117e36388edd38a479fc5a4895e8f18d6f0ab862bfa23aca33cd43810949abd400f7c4fee93d05d69292c3ddc86e3a2ebd06d670edc5ab6af79", 0xe2}, {&(0x7f0000001700)="7eed4d2ee90cc7e403b294c4c404d8decb3f6e4061df3c6e173aa5704ae399a2b98ee0c3ad4d0a98ab88b5e2efff5dcfe7ec2dd605161ad19cace7de6ea86efafaa1723a64ae2e5ef51b9867a913c58f220964e61aaba83494403ca8c1564b5fba2db0a8ac55383229e9f3e6fe35de7aaf847e6912b66742829fd88b3596cb87ef9b0d584cbe00cbd7f779329e7a6b4aac9667681f0886c6c3a6442920bb523736d3db0dd61b1e5ceedf4c59a7f837286d7d829d337465ebb5c60652a1a56a7be131c5eb8a00e7eb82694af9098cd1526b", 0xd1}, {&(0x7f0000001e00)="73c882bad6752ba79f052c8b719e610007a0e7694a6c41636c633b85d975d2c6b6c9523d0f09635676cc0af57902e1a215cfad28fc56cbc33a75bcf46a944f2ef5f13d5f18bec3eeee97e60fa3c9429af223b73a2591c8dd91e6b5389b51546dd30ca4d6f7df1ab137018cc07e59e8669c5f164288fdb79e66c9422cea88971ed2d09078d995afeaac2617b7e272e602cdcdd762abf700ff0847b91c2552cd331d95e76bf20cb8893c1d18fd201be2ae42881ea915f772053f58584a58cda44ab26eb0cb88b5a08af30936d1c737038a71bab5c26c8a62ad7e50a08a8e340f6783696c548e2db106099e6ab82d50a4676a5ef80ebcda2c73edbd00bab047d7e8f84c1131340705b8ad51f9cc95dd2f2bd0e63f200f2aa15c52c940d8cf6889d755468fb8991e34fdb122f6b87e9b10c8c9fefe342aecf596afb47f09549dfccc4da122a0415156c9ea5820591194e5661258792b32a30662b39320459ebb9f3246794fb25ed13505b2c9f64ad3599264ea22fb37a7544843dd74dd13a32145b8d4046ef29d3fad30b8d89ac11a37b7802b9ab5942a6e5a73ee8405e2f750b347e2093cee9d51674ae3a1ea73ab06167a80272e93f4a7eea88999ed00e94df2e8c55c59bb55fdd5e0aead5252ebca0709f9e1cda6e6211c4a9db89859db2b1e1d361aee4a02a8332303caaf5ab83eddbcbcbb9c953d8214b03ce7181a3cacb9b61ed2a07bae9465610ab844f055be9f24a6f817e829ae39a432189ba562fc464f3456ad03c75353c218a50076abaa755ff374a27d98e678dcf5e94a63360139443d2fe9b3fb313f973b1a30603a198887cd358da5098b4a5f55bcab8c5f1d89582f941350a05e4aa568df1f92e300bca7d22de2991ea035a168ee4ed0bfa520482d3d600a410aabbf10e86a561584c35b88822c6a486802e7a675cd05556965ac7269f9cd53ee5c480ad593a8ac39eba66a99446180662ff83199d985c5ff74e98725fe26720e5926a9155a6b59d1b48e48db9ee2b90d9b3caaf1da3cdb82e9dada8a59a63b960bc870b4707accc12eebeb0d7d9a4103a83b6bbde6d5ad8572fa52a4278ea2f60b50ce55e539351f5afb3f3c7bb672209aa4ba62029dbdfa08529257c4a09ec9382cad69e963dc6587b809ea19198e2901d213b82f8eabbb12f9c95fc931ab49ec827a60a177b3db69a4a2353ea68d27a52c543cd4e0a8120181d3de66c1ac0f44f7b14e88406a8e49593f6eb5227a42bb9d6ea9b7eefb6cd812ed62e67cb7539de6c35fa7cd6bd06ee9472c718bf637a05a7490f1bef4125111fcab226dbb9f31ed40c7cede993bd07805eb942c705a510fdc2b1a32644b6b311fb94ba233b56ce1c128e3addf57635e0c825da67bbb52379b8729fd8d9e8a8892b6cd3b21663e541445b2f474920314748f1e8415950afa4d759767cb800810f427fb1beba94d8bdd553091dcc300f32280381c36919f95e9bb55ce872708205899f7d1b3480148520db5ed67c40402335ffdabc1ba13d6e546c3c58ffa83bdd3f7341cc2c14d049cc213e8cd8978cfb566f507b3bffa286a937bde236c92877643b0ec3bf289afe4992d2a9e4736a879eac78f6fe5b3760f4df3ea3cb0de7dafed727c75ce05d3426f20639970cccb8790e07e62302f93d00dc2ddcea514ab1930e06cbc35cedc74a4f12cd87c991e4689502cf905ff87aaeb542efc2293ff0c183b358abbffbaeffbbdfe3321f33d5f01536a436857d4d010f8a352ffa0919b6c8d9eb0267b631f06de3e8251f9120bbf2116a4244ee5c9e24a075dd93f757e6d5d727371de15d0e11e43a1b62673aa39897c811aa27f24b7dbf59150ac871821a7ab2b8fb849ab4326afa03bb650fbf67bb0df4f85ab392c4a9070509ede8c8d063941cd83848a55c19086bee56eca5092761f6afdb9c18398c06e3f83ca74dcf498fdbf0fc87e4fccb0fe7e67d1c4f1fa230dd5974411e736eb24a799c9003e8a6559a81261e0f9b0d050c369e767c80601a676a1188c72fdcc1fab6a952a50c18bc84eb2aaf4718575b93849b7e157d66d94616222194984993edafe6cfcad4bfc3c3dfdb0d5322cbebc457cd36ec23ab67846586e63a7e9b96b0b33e1a0457d0bbde04f1b3377dd6473c0e9e7bd0df884d65180eff410c4d251d362f6be2e2cdcb6d5128eac98c0e4422e514461139acdccc581ba40eb13828f0ce7452df5dcbc32edfc63a70864ba4cf4afb80a75c722677dc654d1d441b34d2ac44906c9329d161da499f0ec20be227365136dab111bce4cc8d1f922bd8c108fcfda95c66b7d206df6db0ef21575836e32a64bacf92b299d54f983d31d54d8069ebf6abbc3ae6c0e1ee951c6d59daf29aacc29fee94c206d7ef7a7a3bf40cbd3803cdf9ce5c8c3f47b3ddba05acb55977a1ffb2057754ac2771c3d6f50a9e24bbfbffb914411601d1047bc477323e175837857c43dbae2efb40cfdc91d686f9bc32bc0e13faf847d199add840a822938d7bb7180c4e03bec741f29f654ac09876c02179d7ab4baa42ef593e53c9d4feaf2a9800e5a26e2b55cbc7a00c6bc06d62d5e5c9d482589cc7f70b5fee946a4824a4647805f1f2489c2cc749fabb7baed854b2598147848e2e1e55aaf12c305473dcf0827dfd6c264026e7b3af47e9861e9e381ca1d858dad6199b218665e42370379131e42ec98c2ec1b92eae7a6c630f64bc7f25824bbe2e6ff3daa82be8f8e569ab6e66ca2fdf1ba58159c5745ee4e07365a2f372b1aa4f1094d693445ffb1414a8c71130433c0ad3dc17361c80ad862eefcf0b855355a8bf56b0a204e28491d84b1f5b551e7f861222ef23298cb7a3e83b6e2299662f5519406ae9a6d2cd8822af4c6e2e5262595a60cdb502a2e94cd010b330b8c2fed966991ae6b0ee5523f4d59ee0b0e151cc7483f187f7b774d57ee57cc0b9663df6632efa6bf830282a99c219653c16be23be3179fb75552d764ea8cc58b1d0074a5f64352041e77a3d442581d1ceacac9d1d5f61f826397673efbfd340496acd4f3af063c1e36aceaa64af71b98ea4a0e67a284c69bf56b2a7c316ff0db74da94269423f7a5349b75e901c18f15bfa28136b8d37e5ed0e854d85d63e98483c0a28baa44355a79b9546175e26b4b0677e375eb2b0bf544d5ce8bd711f8ef3371299bbc2fd6e8e5373d7fad9bf51ce1f289530ec9895ef954c609883f75a3226005e1b3e90390e2c1754767819f2f4903e1edf838c5ee6541ad1562c7d98fa5daa163714767a6a5c1a8b3c92163a9564fa709d4d9e1584d59a5123adf9e006c2c2663838fb23b60f1fac5aeb39486ee8618ec63fc0c0f2f1ec5ae697d6046d73e857c19682221e18d2992d66a50a5c6097494ceec98fe0da6e4a6ece0d3d2d68ff9bf65bb33bcd24e8911bf0a585be74b09906db0cdf9250dda4902e73f4122b6ca7e1da06e0d3f78b571c4b1cf0f00fe9c619a33cfae5f2120c00f99d6075da283679167e64263182623e08443c046e8c31007e538b4f3dba238e23ffff1d8b3d87c28039269387bd9489ff653e587f55e452ea6177daf152e8946a0f319d7c4d98990b84b47ee88ab60c06eac17a1131a5ef74f40497f31c8aca197b9ca49edf4ea3a626c0bee1682f8a1d3dbdec36688de25e4a830b17e2397afbad9b8deb0da9c75dffa3080977729c42f94efe7648e499276c24a07db307e7c91dc2ae9e3d7acf312967a3b08a0f0a3305f466dfdd42c89f4b84c50755b2b9e0976ddd4b4a0de257c58a6e360e53100daebe2e7f35641fe7d3aaf3420a678688b15eebec6b23b7f147050fba8b6766a983a01ac04f1ae96bc58c35f17dda0fd893dec0f74a392a5ec37ee2603f663192db5c1d12774595eb0ea4ad9cb5622211489d96d1adb731744046f60dd81ec2ffed8ea3ce71b7a00ee9e87d462f80ab890d1c7bf1c1bf268254c4b1824ff2f4ad5b5b3bc59fb915d0f171c30426008c4aaf32fd8449fc5a22daaba02d3923e8e0de3bf422c63df164657b1e1bca259099ac30e4fed02440efbcd8d67effdd132a5d6bbab6804e966fe3df38546a1ff6839d3b650ed4642339606a40b7c2398001bc0252ecad0d0e5b800fbbbe81d03b77dc004200f614573f19b5e0ef829254d01b3cc2c7bbe75b707d5a500887320109eda570f0e57dad1b0b99ba02fe6552bfc120475d7b315388c239f6ec05720f3cadf123f31810a16b9de395189aab30a4d2f04f68408717e3deb45950aaae244ecff8c50cbe6d914916dbc9962dc162c796f702576ab4923e43d2a7c3a2783d46f3ffaa00666381b6efcde008ad4bcbc879fd1c65b7eb62638d3ab6d38e50fc920dd12553fc08cf944517a345766408d076a39179c54a6abdbe19e95a40b757e8effbc731ba98be3a8af902cba05424f5c7f4a04ad3230eb25797ca39678447126bfad8085f295a2b1462c7c30a7616e145075ca6b4b3d9273df85d5d429c52fb9e60a1323b50b3251c4ef123de0bfd7925b836aa8ed862a1b214ddc328fd9df27ba917d07183354b137553d77b1374fa58ec1bc9d57e95093fbc077d0ad62e60727fce74c83a627ce075fa80fb0fb5152104c10145d0affcf052eafacb448bc812a03b997632deed7e3cfa67a3baabc2fcfe77fa70de5574f40a2dd3fdb45a142682e37d7b22b5d933439d333b0911c0f70ebfe92b5fdf573315cf5dd2ad146fa74af466aee23a25e26f9af649cfe3c7fe1ae3ac9981e3de48e2b458b79875516e0d853f30f6ceab04a427b17913b7456783ba48e95a97a823084f325c5bdd221243e67209f9b56377191a1a2c5c21926da7b067b164fa5b9cd766fdc396b0c614429b96a31ed6b3c2ee2596812b7d3137929377603cb518a02a5abb597e9599aa1ab706cedfc82f8a8893dda03c27eb6e366fa82f07e3192a5bc9cde761a70235bdeae02e08b805638063d9a68ae7ea62d56c6b81d695f28cac248c51268781257315b715ad0fc9b2d1427d8d1014a704d577f770c1a35c37ce357199a4b499787def5d681df9510eae1d1c3940642b446dd05eaedeab88133a3f92a54a35bfc22b01d7f9dccb6d3ad83e59f91351f75ff6b344edc6d608da3bb035946e0eb3b0b317a21a3adb0aba1278d22a1a600c586064eff3c325028dbc77ca29b66aab35118410ac7b1187660300fc7e2824472f2ea9ae5d6c6d32ae3dfca86b18fe3f6392fbbc7081094f63302cdd51dc672769a5cc50e10ddc94ddbc48665dd9045d2d0ed44e001e673011a2f60b0f7e746d9e5a559a39dd921fb754b1fb51e75e93e6463ebec17923077be21ed4340e42fc1982649f94072ff60dc0ddb6660986865b041797cc44fba2317dd002885e9fbd496c2da49f885ec1de90a46b7b2b1280501cb5e98aa60cc6c19ba5b0950eaf0d758437c4dc0d17290d161b27f267a0e69b02e2a899114b8bfe1dbb2aa26a6f66c4832c47b8a9d9bbb025d2f9ae84db64979b802977cca44445c49363f040310ba238ad88706fafcf14e7e67696743e868f4bddd012a9ac68461aefb2d34b8751a9f50abf707bc254ad3560e3998287cb921385489087824f92392436785ed0ec4a574f953e646f42221798d475c72dc534fee4fd47afb8d138f56db18a052e7bd0d747bda897c69a3860d55266dc9086a184cc6f93ef310928d16eee578379cc3b96adf013cbc4cfeee2dfd26af4c4674ea52907ae7abaf2d423675ee1e33ace18ee7b77d4716d9bdc9c3929812df849c80062ec7457a7d94a626e44a7930670b6bfc4d4e17dbf37129b599d124c00e", 0x1000}], 0xa}}, {{&(0x7f00000018c0)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'wlan1\x00'}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001940)="f03d838129a1c5139fb84d9ea4a41f4c8638c9cf2936019b33bd04a1f92f0fb2b18ec128b462d18a4d9a979818615a669b0ae7d21f41fb6fa9f72f46f9a8caebe21cfa285bd94fd190b497cabdd049c3bd90d2cdb8f59f6eb79e7b24568731f76906c7b527eb8947702919f620959c0096f2954aaf9b2eed5d3763599ded8c07ca2369db0cf9777e4a0538d64f7e438ba1f3c9d495d437a8b23bfb55b3329cbf111df471579d9f745b2ed5f27532e712d0b38000bb021aec22c3e0d0b060a157b0f88af1c99b537e64067ccfd2c8b963ba18f4ec2a74898058b86942d9aacca16775f3e0c6db02bf636fcb6f56e865e14753", 0xf2}], 0x1, &(0x7f0000001a80)=[@txtime={{0x18, 0x1, 0x3d, 0x7f}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x30}}, {{&(0x7f0000001ac0)=@qipcrtr={0x2a, 0x1, 0x2}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001b40)="145560825227ae0e734e1078ed9ca438a422d316e1e8b3c438bfcfff91d9707e1da87b83beb2bc7b25f3db1466212bd92cdb48849f67757d12a85d708339dfa4a1fdd6da06fff6c8fcfdca8f395be65e79932ffc53deed2401173327ee03fb3bae6311eb67ef8d582a4ca4cfa79b96fd884013b1190272d5c52b21379f1826ce4f8517d63a2e2ff465a588824685ffb0ebc61fe3ce6d60256c5d34aa3c3b15e30b4186b5be228d8220d449ecc8", 0xad}, {&(0x7f0000002e00)="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", 0x1000}, {&(0x7f0000001c00)="5acd35c68541192c73cb6febef581b0b6d23851d22845edb61f14e57c473c51d1e0fbaee680811a6d0be7b539a349eae94c376f6c5d6284f2fb507e3b397d2f459a5d643e9daf6922272f69dbe7f1273e706ba9ed6789c5a754630b8667fddc7ff18fd5daf35819b3a2c95b4ab720b14f12deddee7ceebb0bb2d4e32d266acec6cfef41e15c4898ffda1b850d2b74f843962f685284501b7a44b18bde6b2b801fc0a70698751531c658d7c934799b05bb495c9e1bb2be00a1496d615596f97079df84eb1bc47b0c90cffa1692101", 0xce}, {&(0x7f0000003e00)="73aac5c24ea530bd0aac212f75da638aa379c5ed3e5e1829e7198cb2bf1392dadd2c4670755d015c7435da994ab57c6d71349d717d471b2918fc37ae38661f03996df87128ff76d04892b41f7022419730cdaff70ffbac8b0f2d2bc5c82f755595454c501844778571911d610a1d23965961fcbac398f92afb2119a890a5ee71970d4bd322dda8c3f0f6e022a634d5fd8490016145e897c10669ef1eff65e7e495f426f55cce", 0xa6}], 0x4, &(0x7f0000003ec0)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffff7e3}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0xf0}}, {{&(0x7f0000003fc0)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e20, 0x3}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000004040)="4b3ef00ca9b6023c47f1a1cf36fad054f9d51b306d5c43d75c2e40a71caf7d0e50cdd96eadb6bf919855bdb761d6392a3993036c0bbc225a5f4a6c774a68686aff95a848e99f07a01b4dcc02a83f67d7c3afda0860adc4f91fd5fe7d42f5ab67a15b71d2ad7022d68673f5663543a4b93aef37e4e7e09f87fd748f9b52fd1a5a7048f5cf36c3fb36a4f001de8ef1f55fffbca75e938ded4f517433dce5383eb1a1f882a1b385c0214989105e2d63e41d83f69e845c2e06029fdc81", 0xbb}], 0x1, &(0x7f0000004100)=[@mark={{0x14, 0x1, 0x24, 0x9a}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x8001}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xe9a}}], 0xa8}}], 0x8, 0x4000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f00000001c0)=@sco}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000004500)=@IORING_OP_STATX={0x15, 0x5, 0x0, r5, &(0x7f00000043c0), &(0x7f00000044c0)='./file0\x00', 0x1, 0x800, 0x1}, 0x80000000) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000068280)={0x3, [], 0x0, "e2253fd563c1ba"}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2860.711081] kauditd_printk_skb: 66 callbacks suppressed [ 2860.711099] audit: type=1326 audit(1713662030.118:19717): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.715317] audit: type=1326 audit(1713662030.118:19718): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.727380] audit: type=1326 audit(1713662030.118:19719): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:13:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) fsetxattr$security_capability(r3, &(0x7f0000000000), &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0x9}, {0x5, 0xfffffff9}], r4}, 0x18, 0x0) mount$9p_xen(&(0x7f0000000080), &(0x7f00000000c0)='\x00', &(0x7f0000000100), 0x800000, &(0x7f0000000280)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cachetag={'cachetag', 0x3d, '/dev/loop-control\x00'}}, {@version_9p2000}, {@privport}, {@cache_loose}, {@debug}], [{@measure}, {@uid_gt={'uid>', r4}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1712d87acc4840a32c0d3f9fbfeff2d2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2860.748220] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2860.748220] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2860.748220] [ 2860.752927] audit: type=1326 audit(1713662030.118:19720): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.760758] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2860.760758] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2860.760758] [ 2860.762820] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2860.768002] audit: type=1326 audit(1713662030.120:19721): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.770996] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2860.771961] EXT4-fs (loop5): group descriptors corrupted! 01:13:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1e5, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2860.781874] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated 01:13:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2860.790928] EXT4-fs (loop0): get root inode failed [ 2860.791733] EXT4-fs (loop0): mount failed [ 2860.796126] audit: type=1326 audit(1713662030.120:19722): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.816042] blktrace: Concurrent blktraces are not allowed on loop8 [ 2860.823046] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2860.823046] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2860.823046] [ 2860.831337] blktrace: Concurrent blktraces are not allowed on loop8 01:13:50 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2860.845048] audit: type=1326 audit(1713662030.120:19723): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.848008] audit: type=1326 audit(1713662030.120:19724): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.851631] audit: type=1326 audit(1713662030.120:19725): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.853824] audit: type=1326 audit(1713662030.120:19726): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15501 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2860.876737] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2860.880666] EXT4-fs (loop6): get root inode failed [ 2860.881130] EXT4-fs (loop6): mount failed [ 2860.898181] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 01:13:50 executing program 1: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2860.934156] blktrace: Concurrent blktraces are not allowed on loop4 01:13:50 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:13:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@local, 0x5c}) r2 = openat(r1, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="d5aca52b8825778c5735351b64e0d161c8578eb2d8f8ef6f44b6716e57ab49bc923740479cdc1c8b15594379f31ae21ef27ab9f868749ea49f2b48038811f91c9869977e4c345514bf91720f04ef93f4b171dba5e27d2eb24ae365c95360a84260cd8876c0b9fc8241418326450a6b6c9b04e67d53a4ffbb6387302a571526bf7ea18c35453423d681e1000000", @ANYRES32, @ANYRES32]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r1, 0x80049370, &(0x7f0000000180)) [ 2861.026258] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2861.026258] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2861.026258] [ 2861.028692] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2861.029479] EXT4-fs (loop5): group descriptors corrupted! [ 2874.103270] kauditd_printk_skb: 101 callbacks suppressed [ 2874.103283] audit: type=1326 audit(1713662043.510:19828): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.106112] audit: type=1326 audit(1713662043.513:19829): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.108522] audit: type=1326 audit(1713662043.515:19830): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.110523] audit: type=1326 audit(1713662043.515:19831): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.116697] audit: type=1326 audit(1713662043.515:19832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.123415] audit: type=1326 audit(1713662043.521:19833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.126460] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2874.126460] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2874.126460] [ 2874.129054] audit: type=1326 audit(1713662043.521:19834): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.132117] audit: type=1326 audit(1713662043.521:19835): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 01:14:03 executing program 1: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:03 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x20410, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7ff, 0x3}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:14:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1002, 0x4) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:14:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x27d, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:14:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:03 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x7fffffff) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b694e5ea099a49629c6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x204c0, 0x0) signalfd4(r3, &(0x7f00000000c0)={[0x1]}, 0x8, 0x80800) [ 2874.146437] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2874.154432] EXT4-fs (loop6): get root inode failed [ 2874.155233] EXT4-fs (loop6): mount failed [ 2874.161335] audit: type=1326 audit(1713662043.521:19836): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15547 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2874.176385] blktrace: Concurrent blktraces are not allowed on loop4 [ 2874.182069] audit: type=1326 audit(1713662043.521:19837): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15551 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2874.201044] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2874.201044] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2874.201044] [ 2874.205808] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2874.207374] EXT4-fs (loop5): group descriptors corrupted! 01:14:03 executing program 1: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:03 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2874.235416] blktrace: Concurrent blktraces are not allowed on loop8 [ 2874.280633] blktrace: Concurrent blktraces are not allowed on loop8 01:14:03 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:03 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:03 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000540)={0x9, {{0xa, 0x4e20, 0x12e2caf0, @loopback, 0xffffffff}}, 0x0, 0x4, [{{0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}}, {{0xa, 0x4e22, 0x5, @mcast2, 0x7}}, {{0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x8}}, {{0xa, 0x4e24, 0x4, @ipv4={'\x00', '\xff\xff', @local}, 0x4}}]}, 0x290) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:14:03 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:03 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2e9, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:14:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376cfc526f4aa8e8d90db8404d8863765c6d7ea05b677a34b6dcf4513a7cb51ed5dae1f9bf90110f79a71d271bca8a4e5b7666325599586375815b54ac979587cd6f2d657c04f437f9a77fdc0bfd9151442dc44a24a72821b10fe0e939a568af3014171b45e4fc3a28de92cd7a51c9e3a0219a08f7702254372d4f8b642c610567cb64514356dbb4a4f585d2909e9375f73425bbd7b8380a2437bfbd215909644d689a8913c88ee6ffe138e0a6af26a0a6b"]) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:14:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x140) dup2(r5, r6) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:14:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2874.488876] blktrace: Concurrent blktraces are not allowed on loop8 [ 2874.516472] blktrace: Concurrent blktraces are not allowed on loop4 [ 2874.518397] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2874.518397] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2874.518397] [ 2874.526937] blktrace: Concurrent blktraces are not allowed on loop8 01:14:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:03 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2874.563096] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2874.565264] EXT4-fs (loop6): get root inode failed [ 2874.566126] EXT4-fs (loop6): mount failed [ 2874.608366] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2874.608366] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2874.608366] 01:14:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3e0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:14:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:04 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000440)={0x2, 0x90000000000, @status={[0x20, 0x8, 0x2, 0x4, 0x0, 0x8]}, [0x7, 0x2, 0x5, 0x8, 0x9, 0x3, 0x3, 0x100000000, 0x200, 0xffff, 0x7, 0x2, 0x7, 0x1ff, 0xfd8, 0x3, 0x3f, 0x1, 0x10000, 0xf80, 0x7, 0xe6fe, 0x3, 0x401, 0x7, 0x100000000, 0x200, 0x6, 0x0, 0x9, 0x1, 0x401, 0x5, 0x1, 0x6, 0x6, 0x5, 0x4, 0x9, 0x1f, 0xb0, 0x8000, 0xffffffff, 0x5, 0x1, 0x5, 0x1ff, 0x8, 0x0, 0x20006, 0x7, 0x100, 0x4, 0x40, 0x6, 0x5, 0x4, 0x8, 0x800, 0x0, 0x2f1, 0x9ad8, 0xfffffffffffffffe, 0x80000000]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2874.657103] blktrace: Concurrent blktraces are not allowed on loop4 [ 2874.670202] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2874.671820] EXT4-fs (loop5): group descriptors corrupted! 01:14:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x10, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2874.775924] blktrace: Concurrent blktraces are not allowed on loop8 [ 2874.798259] blktrace: Concurrent blktraces are not allowed on loop8 01:14:16 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000000)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x81) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_udplite(0xa, 0x2, 0x88) [ 2887.314319] kauditd_printk_skb: 130 callbacks suppressed [ 2887.314337] audit: type=1326 audit(1713662056.721:19968): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15636 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2887.325324] audit: type=1326 audit(1713662056.729:19969): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2887.333677] audit: type=1326 audit(1713662056.729:19970): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 01:14:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5095dea873cfe000000002e2f66696c65300057ffd80300000000000000c19bd10376ea2fb8ed8859e8b65d837f4374046601302029e6942f223a3c564b7550a396509bd8a2ca41afbd1a7535b81e063652934217a63c5f60b4939d9fe2be2e93c412f556d6bfb12ed8f93a9f0f390721ca94fbf5bd92c3ab"]) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fsmount(r0, 0x1, 0x81) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) kcmp(0x0, r2, 0x1, r3, r4) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:14:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:16 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:16 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000000) sendmsg$unix(r6, &(0x7f0000000780)={&(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000000)="34f3afcc887cb9349827", 0xa}, {&(0x7f00000002c0)="f8a4720341188dcaf24735a748241a13717720d5026b09bb2f5b016970e5f6563ff1c2", 0x23}], 0x2, &(0x7f0000000340)=ANY=[@ANYBLOB="3d000000003e1477cf186777900d7492e7a3c6075682dd41b47e2e1c8546cca970928e779ed33451c6a5c0af86ec52607ab22098750e3f36ac987b5ff2538b84631ce0043a1079a2851c1e6151ce00000000", @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r2, @ANYBLOB="0000000000000000000001810000000000000000", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00'], 0x70, 0x80}, 0x810) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:14:16 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:16 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x10, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3ec, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2887.343001] blktrace: Concurrent blktraces are not allowed on loop8 [ 2887.361833] audit: type=1326 audit(1713662056.730:19971): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2887.375481] audit: type=1326 audit(1713662056.730:19972): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2887.382139] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2887.382139] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2887.382139] [ 2887.412206] audit: type=1326 audit(1713662056.730:19973): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2887.416679] blktrace: Concurrent blktraces are not allowed on loop8 01:14:16 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x10, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2887.430736] audit: type=1326 audit(1713662056.731:19974): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2887.434349] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2887.437300] EXT4-fs (loop6): get root inode failed [ 2887.438085] EXT4-fs (loop6): mount failed [ 2887.442244] audit: type=1326 audit(1713662056.731:19975): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fa47dfecb19 code=0x7ffc0000 [ 2887.460350] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2887.460350] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2887.460350] [ 2887.465372] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2887.467005] EXT4-fs (loop5): group descriptors corrupted! [ 2887.479366] audit: type=1326 audit(1713662056.731:19976): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fa47dfecad7 code=0x7ffc0000 [ 2887.489485] audit: type=1326 audit(1713662056.731:19977): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15639 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fa47df9fab7 code=0x7ffc0000 01:14:16 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc89bd1037600000000000000"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:14:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:16 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2887.611812] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2887.611812] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2887.611812] [ 2887.618752] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2887.620139] EXT4-fs (loop5): group descriptors corrupted! [ 2887.652853] blktrace: Concurrent blktraces are not allowed on loop8 01:14:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f6668f365300057b6d84dc870092c61bd6cc19bd10376"]) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:14:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01000000000000000000050000000c00018008000100", @ANYRES16, @ANYBLOB="04000400"], 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth0_to_team\x00'}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:14:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:29 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x3, 0xfc, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x3, 0x1004, 0x0, 0x6, 0x8000, 0x2, 0x0, 0xffffffff}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:14:29 executing program 1: syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3f9, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:14:29 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:29 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2899.660371] kauditd_printk_skb: 114 callbacks suppressed [ 2899.660382] audit: type=1326 audit(1713662069.067:20092): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.670675] audit: type=1326 audit(1713662069.067:20093): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.672744] audit: type=1326 audit(1713662069.067:20094): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.688461] audit: type=1326 audit(1713662069.068:20095): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.694262] blktrace: Concurrent blktraces are not allowed on loop8 [ 2899.698266] audit: type=1326 audit(1713662069.068:20096): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.707960] blktrace: Concurrent blktraces are not allowed on loop8 [ 2899.708779] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2899.708779] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2899.708779] [ 2899.710936] audit: type=1326 audit(1713662069.068:20097): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.714674] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2899.714674] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2899.714674] [ 2899.717082] blktrace: Concurrent blktraces are not allowed on loop4 [ 2899.721859] audit: type=1326 audit(1713662069.068:20098): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.730725] audit: type=1326 audit(1713662069.068:20099): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.737032] audit: type=1326 audit(1713662069.068:20100): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:14:29 executing program 1: syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') [ 2899.741054] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2899.743200] EXT4-fs (loop6): get root inode failed [ 2899.743746] EXT4-fs (loop6): mount failed [ 2899.758670] audit: type=1326 audit(1713662069.068:20101): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15680 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2899.759678] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2899.767167] EXT4-fs (loop0): get root inode failed [ 2899.767948] EXT4-fs (loop0): mount failed 01:14:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="014c76c2b783d249f5ffffff", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dfa873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2899.791804] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2899.791804] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2899.791804] 01:14:29 executing program 6: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2899.807703] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2899.809416] EXT4-fs (loop5): group descriptors corrupted! 01:14:29 executing program 1: syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') 01:14:29 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x3fd, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:14:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:29 executing program 3: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x3}, 0x6100a, 0x5, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6f, r1}) setsockopt$inet6_udp_int(r6, 0x11, 0x1, &(0x7f0000000000)=0x51, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r7}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:14:29 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000000)={'wg0\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x4000, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffbff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000340)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x7, 0x9, &(0x7f0000000240)="27f4599bfe5756563ddfe2049230a1f65198e9afa948c08cacb27eece578f2e04e36f67c3ecc2f1ea05de31ca4e7d64614d237ba8f5afac7e9b17dc62043f21f4b2397b86873f6cf30a187d7638430f8ccb48e873d51501bc2f5d05443813a3cd73ee6f3cd3019a5581f22518af02481a59d0ad53c76e99525749db48e4691ff38ab", 0x82}, 0xf809) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000300)={'batadv_slave_1\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="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"]}) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2899.887471] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2899.887471] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2899.887471] [ 2899.892088] blktrace: Concurrent blktraces are not allowed on loop8 01:14:29 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, 0x0) [ 2899.919595] blktrace: Concurrent blktraces are not allowed on loop8 [ 2899.921662] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2899.921662] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2899.921662] [ 2899.925213] blktrace: Concurrent blktraces are not allowed on loop4 [ 2899.926603] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2899.930617] EXT4-fs (loop6): get root inode failed [ 2899.931026] EXT4-fs (loop6): mount failed [ 2899.962002] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2899.963262] EXT4-fs (loop0): get root inode failed [ 2899.963757] EXT4-fs (loop0): mount failed 01:14:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="54110000", @ANYRES16=0x0, @ANYBLOB="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"], 0x1154}, 0x1, 0x0, 0x0, 0x4040014}, 0x8814) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, r4, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x0, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0xfffffffffffffea9, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x4c}}, 0x4b8dabffaee737b1) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f00000015c0)={0x80, {{0xa, 0x4e21, 0x6, @private0, 0x1}}, {{0xa, 0x4e20, 0x40000000, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3f}}}, 0x108) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:14:43 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4a4c, 0x1f}, 0x0, 0x8000, 0x0, 0x8, 0x4000000, 0x0, 0x52c}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x80005c}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000540)={{r3, r4/1000+10000}, {0x0, 0xea60}}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000400)=@IORING_OP_WRITEV={0x2, 0x4, 0x2007, @fd=r2, 0x9, &(0x7f0000000000)=[{&(0x7f0000000240)="fa8f62efc61590661eed280c94fd219e1f44c06844abfc4102a5e3de71bf27e765be28c715ad1a75f31375ef9f610bc01609414d63880f65b9f92925a2b39e418de2d2f5ce8edebe4aa3d4a07359d4be800903da830da90deba0de52db59beb616890c50f4576b4fc99692861d0f771f5879b5f179c6532555030a3808b40b89a3543d11925144e3be484834a7b3ac9e845c2440d4da61a3c92898d47e0cb5e1d91b355ddfe5f00428ed51f9d70f8dd51aa82e8a1907af2a15a99e785b58d65bed7895bd763b1fc6eab68b0cb99944cd4bed5e666778e8c74ee480f05f13", 0xde}, {&(0x7f0000000340)="5d1b4a5e056870fb1d06008d384ed9aeee153f52ba7b25fbcc7f9e13778f89fee3a60ab175e785166e20be2e61d1dd927d2baaa2f407be5746e5364f358aefa5d89b0dbc5c06e1212596de329bbd10335b2887bc767d7f59e34afd0cc8c76f474d21af886a1850b53d0784a7c9a7f8dd8b3a294c0b6dc0c2dcd47597c4f1bd6e2952c3672fc027fad019d0332a8fb53354563c6e95b54f6c6e7d69cd31e2afd9e8d4afb86378d0ec7646fd5853d8a3420bc833e1c2f3cbbb", 0xb8}], 0x2, 0x1, 0x1}, 0x353) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:14:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, 0x0) 01:14:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:43 executing program 6: flock(0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xa00, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:14:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000fc0)=[{{&(0x7f0000000000)=@tipc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000001c0)=""/12, 0xc}, {&(0x7f0000000240)=""/33, 0x21}, {&(0x7f0000000280)=""/206, 0xce}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000540)=""/95, 0x5f}, {&(0x7f00000005c0)=""/247, 0xf7}, {&(0x7f00000006c0)=""/216, 0xd8}, {&(0x7f00000007c0)=""/226, 0xe2}], 0x8, &(0x7f0000000940)=""/241, 0xf1}}, {{&(0x7f0000000a40)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000ac0)=""/161, 0xa1}], 0x1, &(0x7f0000000b80)=""/195, 0xc3}, 0x7f}, {{&(0x7f0000000c80)=@pppol2tpv3in6, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d00)}, {&(0x7f0000000d40)=""/7, 0x7}, {&(0x7f0000000d80)=""/105, 0x69}, {&(0x7f0000000e00)=""/69, 0x45}], 0x4, &(0x7f0000000ec0)=""/194, 0xc2}, 0x3f}], 0x3, 0x40000163, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r7}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2914.068042] blktrace: Concurrent blktraces are not allowed on loop4 [ 2914.110376] blktrace: Concurrent blktraces are not allowed on loop8 [ 2914.116312] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2914.116312] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2914.116312] [ 2914.120988] kauditd_printk_skb: 66 callbacks suppressed [ 2914.121006] audit: type=1326 audit(1713662083.528:20168): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.128224] audit: type=1326 audit(1713662083.528:20169): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.137545] audit: type=1326 audit(1713662083.541:20170): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.149852] blktrace: Concurrent blktraces are not allowed on loop8 [ 2914.155653] audit: type=1326 audit(1713662083.541:20171): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.164541] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2914.167453] EXT4-fs (loop0): get root inode failed [ 2914.168227] EXT4-fs (loop0): mount failed [ 2914.171060] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2914.171060] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2914.171060] [ 2914.177627] audit: type=1326 audit(1713662083.541:20172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.196142] audit: type=1326 audit(1713662083.542:20173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.203869] audit: type=1326 audit(1713662083.542:20174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.211115] audit: type=1326 audit(1713662083.542:20175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:14:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000012c0), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x13, r0, 0x0) syz_open_procfs(0x0, 0x0) [ 2914.218661] audit: type=1326 audit(1713662083.543:20176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:14:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xb91, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2914.237794] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2914.240415] audit: type=1326 audit(1713662083.543:20177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15759 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2914.254697] EXT4-fs (loop6): get root inode failed [ 2914.255277] EXT4-fs (loop6): mount failed 01:14:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x3, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0xc0000) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x5, 0x4, 0x7, 0x7, 0xb1}) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:14:43 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/175, 0xaf) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000300)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/usbmon', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x10, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2914.319338] blktrace: Concurrent blktraces are not allowed on loop8 [ 2914.327405] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2914.327405] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2914.327405] [ 2914.336122] blktrace: Concurrent blktraces are not allowed on loop8 [ 2914.336469] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2914.336469] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2914.336469] [ 2914.357109] blktrace: Concurrent blktraces are not allowed on loop4 01:14:43 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc0, 0x2}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) getsockopt(r6, 0xffff, 0x3, &(0x7f0000000240)=""/247, &(0x7f0000000040)=0xf7) [ 2914.367661] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2914.369020] EXT4-fs (loop5): group descriptors corrupted! [ 2914.370973] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2914.377613] EXT4-fs (loop0): get root inode failed [ 2914.378190] EXT4-fs (loop0): mount failed 01:14:57 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2000, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:14:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000240)={@local, 0x5c}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x5, 0x7, 0x7, 0x2a, 0x0, 0x80000001, 0x41242, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000080), 0x6}, 0x20390, 0x3, 0x4, 0x3, 0x3, 0x20, 0x8, 0x0, 0x7, 0x0, 0x7}, r0, 0x10, r2, 0x18) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x494600, 0x80) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000300)={{0x1, 0x1, 0x18, r2, {0x2, 0x80000000}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x7, 0x1, 0xc2, 0x7f, 0x0, 0x3, 0x2, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x801, 0x4, 0xeb7, 0x9, 0xc9, 0xee, 0x0, 0x0, 0x8d}, r5, 0x5, r6, 0x1) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000680)=ANY=[@ANYBLOB="0100001a0103000000403e6e93846ef2c1414efdf2e0925d36c0", @ANYRES32, @ANYBLOB="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"]) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:14:57 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r4}, 0x14) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:14:57 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:57 executing program 3: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/psched\x00') syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:14:57 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2928.519008] kauditd_printk_skb: 43 callbacks suppressed [ 2928.519026] audit: type=1326 audit(1713662097.926:20221): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.528142] audit: type=1326 audit(1713662097.934:20222): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.546968] audit: type=1326 audit(1713662097.934:20223): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:14:57 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2928.563643] audit: type=1326 audit(1713662097.934:20224): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.573268] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2928.573268] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2928.573268] [ 2928.574023] blktrace: Concurrent blktraces are not allowed on loop4 [ 2928.577287] audit: type=1326 audit(1713662097.935:20225): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.591294] audit: type=1326 audit(1713662097.935:20226): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.600639] audit: type=1326 audit(1713662097.935:20227): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.605236] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2928.607760] EXT4-fs (loop0): get root inode failed [ 2928.608662] EXT4-fs (loop0): mount failed [ 2928.628421] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2928.628421] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2928.628421] [ 2928.653047] audit: type=1326 audit(1713662097.949:20228): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.668987] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2928.668987] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2928.668987] [ 2928.681214] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2928.683451] EXT4-fs (loop6): get root inode failed [ 2928.684272] EXT4-fs (loop6): mount failed 01:14:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="28986ccf10ae544c", @ANYRES32, @ANYBLOB="03000000c1d366696c6503760000000000000000e3ff7eba4531ffff000000000000035c00000002000200"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2928.724666] audit: type=1326 audit(1713662097.949:20229): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.751057] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 2928.752741] EXT4-fs (loop5): group descriptors corrupted! [ 2928.758783] audit: type=1326 audit(1713662097.950:20230): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15809 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2928.766066] blktrace: Concurrent blktraces are not allowed on loop8 [ 2928.802110] blktrace: Concurrent blktraces are not allowed on loop8 01:14:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:14:58 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) recvmmsg(r0, &(0x7f0000003540)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000240)=""/142, 0x8e}, {&(0x7f0000000300)=""/190, 0xbe}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f00000003c0)=""/232, 0xe8}, {&(0x7f0000001540)=""/247, 0xf7}, {&(0x7f0000001640)=""/193, 0xc1}, {&(0x7f0000001740)=""/85, 0x55}, {&(0x7f00000017c0)=""/232, 0xe8}, {&(0x7f00000018c0)=""/243, 0xf3}], 0xa, &(0x7f0000001a80)=""/65, 0x41}, 0x801}, {{&(0x7f0000001b00)=@phonet, 0x80, &(0x7f0000003100)=[{&(0x7f0000001b80)=""/245, 0xf5}, {&(0x7f0000001c80)=""/61, 0x3d}, {&(0x7f0000001cc0)=""/153, 0x99}, {&(0x7f0000001e00)=""/22, 0x16}, {&(0x7f0000001e40)=""/110, 0x6e}, {&(0x7f0000001ec0)=""/174, 0xae}, {&(0x7f0000001f80)=""/30, 0x1e}, {&(0x7f0000001fc0)=""/40, 0x28}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/250, 0xfa}], 0xa, &(0x7f00000031c0)=""/232, 0xe8}, 0x8000}, {{&(0x7f00000032c0)=@tipc=@id, 0x80, &(0x7f0000003440)=[{&(0x7f0000003340)=""/253, 0xfd}], 0x1, &(0x7f0000003480)=""/157, 0x9d}, 0x5}], 0x3, 0x121, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000003600)={'bond_slave_0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000003640)={{0x1, 0x1, 0x18, r0, {0x1f}}, './file0\x00'}) sendmsg$nl_xfrm(r6, &(0x7f0000003880)={&(0x7f0000003680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003840)={&(0x7f00000036c0)=@getsa={0x144, 0x12, 0x1, 0x70bd29, 0x25dfdbfd, {@in6=@remote, 0x4d2, 0x2, 0x3c}, [@address_filter={0x28, 0x1a, {@in=@local, @in=@loopback, 0x2, 0x2, 0x80}}, @algo_auth={0xd7, 0x1, {{'wp512-generic\x00'}, 0x478, "9d6ca7bf8f5f8e876147f8a4422c3a655db88fd431fea2e7b3307c8c2160784e6ba61d15140fcef93ebb14092894f606d610d3ad0fe1f84d2ffd5eba41e8ffed6906bc19f8ba4d9c7a94452677e8b23a491ebf93af85c18f0bfce739c39c6959b0526100634bd805a6e249ccdafa8f6aa7349055bd9660cfa548e889fb5fe665acd9bb0975e0416aba0c973fdb8620"}}, @encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e23, 0x4e21, @in=@loopback}}]}, 0x144}, 0x1, 0x0, 0x0, 0x2000c8c5}, 0x4000804) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2928.880950] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2928.880950] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2928.880950] [ 2928.904157] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2928.907194] EXT4-fs (loop0): get root inode failed [ 2928.908047] EXT4-fs (loop0): mount failed 01:15:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4000, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:15:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2000, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:10 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:10 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000240)={@local, 0x5c}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x81, 0xfb, 0x7, 0x5, 0x0, 0x4, 0x502a, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x0, @perf_config_ext={0x3, 0x1}, 0x48000, 0xfffffffffffffc01, 0x1, 0x0, 0x8, 0x6, 0x8001, 0x0, 0x8, 0x0, 0x1586}, r3, 0x7, r5, 0x2) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@orangefs={0x14, 0x1, {"5886ba94ee47193cb2be7b4800fda110", 0x3f}}, 0x121a03) 01:15:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x1000000000000003, 0x0, 0x0, 0x41800, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x48, 0xfc, 0x0, 0x0, 0x61, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2941.194183] kauditd_printk_skb: 67 callbacks suppressed [ 2941.194200] audit: type=1326 audit(1713662110.601:20298): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.203078] audit: type=1326 audit(1713662110.601:20299): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.219386] blktrace: Concurrent blktraces are not allowed on loop2 [ 2941.221369] audit: type=1326 audit(1713662110.601:20300): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.225003] audit: type=1326 audit(1713662110.602:20301): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.227332] audit: type=1326 audit(1713662110.602:20302): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.230873] audit: type=1326 audit(1713662110.602:20303): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.235966] audit: type=1326 audit(1713662110.602:20304): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.245064] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2941.245064] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2941.245064] [ 2941.247916] audit: type=1326 audit(1713662110.602:20305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.250625] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2941.250625] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2941.250625] [ 2941.251242] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2941.253945] EXT4-fs (loop5): group descriptors corrupted! [ 2941.255245] audit: type=1326 audit(1713662110.602:20306): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.256342] blktrace: Concurrent blktraces are not allowed on loop8 [ 2941.259438] audit: type=1326 audit(1713662110.603:20307): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15866 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2941.270100] blktrace: Concurrent blktraces are not allowed on loop4 [ 2941.309094] blktrace: Concurrent blktraces are not allowed on loop8 [ 2941.319669] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2941.322592] EXT4-fs (loop0): get root inode failed 01:15:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2941.323352] EXT4-fs (loop0): mount failed 01:15:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:10 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2941.380733] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2941.380733] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2941.380733] [ 2941.383541] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2941.384297] EXT4-fs (loop5): group descriptors corrupted! 01:15:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x7ff, @private1, 0x3ff}, 0x1c) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:15:10 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4800, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:10 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2941.444356] blktrace: Concurrent blktraces are not allowed on loop4 01:15:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5e, 0x87052, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x20, 0x9}, 0x0, 0xffffffffffffffdf, 0xffffffffffffffff, 0x9) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) kcmp(0x0, 0x0, 0x1, r1, r0) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:15:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:10 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x4000000) pwritev(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)="e593a1f0ab1ab7a364fd972aa7d3c1987712cba5dcb26e0173a6b4acedb004cf55f631aceb4afaf72cd79a14c6ba4b998f3b48b04cb613dbcbf0a27ace9c279a3ba58e1d2901794f2f7f86d5e7503535", 0x50}, {&(0x7f0000000280)="2acaee075e89ede44113efe9cd3e6ac3d5b87f32b397208fa552526d5029e6683c8d249767715db84b8fc53d4413b43a37b7f2149b37a722fa94ec710712f22e4eb1883a7304d2546e3464b135edd3c5c6eb76bba50226bb0742ef7815439cb74245721b04a406fc07631278e6175b246287ca8b96f43c38145ac49eabe02bc3e8c3775eaf724810bd44ac3b354c1a", 0x8f}, {&(0x7f0000000100)="97fa93716673ec71e5a69a228a53a7e86c290c8a41954119de8b", 0x1a}, {&(0x7f0000000180)="5c85d6481064a4b249b6a17b4d64c50309c5def96f05c19f6f8defba0774497927dadad1a8c06dd2", 0x28}, {&(0x7f0000000340)="76326cce89778943d3bec5460fe30977ef5ed5cf25bf197e51b325b6ea367c9f88035270784fef33951f9d0a9c2894abd9b6d88341d516ce41564fb5b6e6ce4e62ea11a9087838eb0be172efb10dcfc2165c5bed67e261a29f3788ea7be234", 0x5f}, {&(0x7f0000000440)="8388afbac36b09792ef327efd6ca189bab5af195ffa4ee0e6eee5505f2976df14da815115cb01d269c6d76778ae8db7bf3261ec82c579e12bd98ec8dd24d6b362da26c0c17a2b0b17b7773e563d4a32905a6c1a4", 0x54}], 0x6, 0x1f, 0x10001) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:15:10 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2941.510194] blktrace: Concurrent blktraces are not allowed on loop8 [ 2941.535569] blktrace: Concurrent blktraces are not allowed on loop8 01:15:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x21000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x8a040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x6, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000000)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x3024c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x112f5, 0x3, 0x9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x987, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r4, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2941.580164] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2941.580164] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2941.580164] 01:15:10 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2941.584034] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2941.584830] EXT4-fs (loop5): group descriptors corrupted! 01:15:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x1000000000000003, 0x0, 0x0, 0x41800, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x48, 0xfc, 0x0, 0x0, 0x61, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2941.654574] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2941.654574] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2941.654574] [ 2941.668950] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2941.673097] EXT4-fs (loop0): get root inode failed [ 2941.673791] EXT4-fs (loop0): mount failed 01:15:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000", 0x8, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c00, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:23 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000280)='./file0\x00', 0x1000000000000003, 0x0, 0x0, 0x41800, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x48, 0xfc, 0x0, 0x0, 0x61, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:15:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) mount$9p_unix(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580), 0x1000008, &(0x7f00000005c0)={'trans=unix,', {[{@privport}]}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x2002080, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) setxattr$security_ima(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000340)=@v2={0x3, 0x1, 0xe, 0x9, 0xfc, "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"}, 0x105, 0x3) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:15:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:23 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:23 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="71b200002e2f669277480d60"]) openat(r2, &(0x7f0000000040)='./file0\x00', 0x4500, 0x18) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) [ 2953.775397] kauditd_printk_skb: 145 callbacks suppressed [ 2953.775414] audit: type=1326 audit(1713662123.182:20453): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.782494] audit: type=1326 audit(1713662123.182:20454): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.795861] audit: type=1326 audit(1713662123.182:20455): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.810011] blktrace: Concurrent blktraces are not allowed on loop4 [ 2953.811708] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2953.811708] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2953.811708] [ 2953.816657] audit: type=1326 audit(1713662123.182:20456): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:15:23 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x80, 0x7b, 0x1, 0x48, 0x0, 0x0, 0xe010c, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x1}, 0x5041c, 0x3, 0x6, 0x8, 0x0, 0x5, 0x1, 0x0, 0x9f, 0x0, 0x4}, r1, 0xc, r0, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) syz_io_uring_setup(0x3167, &(0x7f0000000380)={0x0, 0x8, 0x20, 0x3, 0x151, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000340)=0x0) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_io_uring_submit(r4, r5, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r6, 0x80, &(0x7f00000001c0)=@sco}, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x4000000) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000001, 0xa013, r3, 0x10000000) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r7, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x5, 0x2000, @fd_index=0x5, 0x6, 0x7d9, 0x400, 0x10, 0x1, {0x1, r8}}, 0xffffffc0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100002ff00e34e6fdb09b9aa9c14ab1bf00c97f63f93741aa4a1d1e943d6ee0e38011554f9580cb", @ANYRES32, @ANYBLOB="03000020c1d3f9fba5455dea873cfe000000002e2f6669ec65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) fcntl$dupfd(r2, 0x0, r0) [ 2953.836200] audit: type=1326 audit(1713662123.182:20457): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.850444] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2953.850444] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2953.850444] [ 2953.856872] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2953.858134] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2953.858429] EXT4-fs (loop0): get root inode failed [ 2953.859984] EXT4-fs (loop5): group descriptors corrupted! [ 2953.860560] EXT4-fs (loop0): mount failed [ 2953.862394] audit: type=1326 audit(1713662123.183:20458): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.893164] audit: type=1326 audit(1713662123.183:20459): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.917267] audit: type=1326 audit(1713662123.183:20460): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.946094] audit: type=1326 audit(1713662123.183:20461): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.972653] audit: type=1326 audit(1713662123.183:20462): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15942 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2953.974463] blktrace: Concurrent blktraces are not allowed on loop8 [ 2954.018441] blktrace: Concurrent blktraces are not allowed on loop8 01:15:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000022f5ff7495100000", @ANYRES32, @ANYBLOB="03003355a60d2b03ec3af619894923fbb0b30000c1d3fbfba5455dea873cfe000000003a2f66696c65300057075d4d4870092c61bd6cc19bd1037607e7d04fb734d967fe964f01b35590017c4bf0849413e5f1947994"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:15:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x44, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004}, 0x1) 01:15:35 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:35 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2966.478525] kauditd_printk_skb: 32 callbacks suppressed [ 2966.478537] audit: type=1326 audit(1713662135.885:20495): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.480975] audit: type=1326 audit(1713662135.885:20496): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.484661] audit: type=1326 audit(1713662135.891:20497): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.487107] audit: type=1326 audit(1713662135.892:20498): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.491062] blktrace: Concurrent blktraces are not allowed on loop8 01:15:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c01, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'bond0\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3fc, 0x7f}, 0x0, 0x3, 0x3004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000240)='./file1\x00', 0x3, 0x6, &(0x7f0000000680)=[{&(0x7f0000000280)="83b79c4b36798e1128f424", 0xb, 0x3}, {&(0x7f00000002c0)="0cba9a7fd9349b523dabc7bb0f2dd799eb827587fd994196a89bc90a89d46bc0203da2f4093a14f00f79e3b1c81edfd21c5e0b8f41330655b4875614c9d940002189b82331afe4d7ce9defa2d18e94d478d37c9f4d", 0x55, 0x1ff}, {&(0x7f0000000340)="80a7d0d74b07dee1ee411b9cd9a04052912ff36c0aec626879a29333b6b86f3bf78dec237d880fdca878277cc7aa1fbb2c705cb6eea81eb1ccd4ea18e1fc9b733ec95f7da2f6ad3e5cec3aa89e4686672a19f128ed9754cc1b2c5539c892", 0x5e, 0x4}, {&(0x7f00000003c0)="5e7b756488ff3d24dcc50993efd0dbc73973987fc3a9a9b1d9e92a37bca25ddf5293e802c5d829cbc391d928866dfe0da0a7ae9c73d5aae64141efe3fd9dba69cb90030227bdb35f6b75cd43aad1b29e9f22296372e8c04043ee42164948637d62e9c6d9a22cb2c0a85f91064f24fbb69632613b6544e6e28023caf58e8572730c7dda4d87ac2e6dac61b71e736f64112f1954388da20ecad5394ce940197340ded64e092852c673ed440ad4bf736f3b606359e83838d197708f15e390fc6c1dd516a20ce1c285", 0xc7, 0x2}, {&(0x7f0000000540)="db4be04a8fe992abf0fb1d3d03fed7415e9cd1f4744e5d5891181e24175dda7f83c1820752a5cbb5621122871fb734e9bf200235854d0598625dadf47fdea565", 0x40, 0x400}, {&(0x7f0000000580)="3fa10baa12bb818b737d5acda22ca4779526d4b0e8e26497699cde9df5e5d56a00946efff443eb907041b306415aaca71972eadfcd58c956cfeb0bb531e07f1e9d7fd42910ff19034bdc887ca0fb06282edfa7080c57818989f35617bcdb86f3a73a4bbb1865ca097378a8a3db8d979d31b38ca68191d9bbeb021da5ce72d19463808a470d2b2d0ae4eb63b4a6763869c9d90211e6d5c38ffa3d7818e4b2c41bd1fdc1b0cbf5fc1564449b774af8b21b825f8f6ee800ee07fc5e091df8c1681999ebba7e2dbbccf9fe7c8f2f67b7309b92cc", 0xd2, 0xdff6}], 0x40000, &(0x7f0000000740)={[{':!\'\x00'}, {}, {'veth0_to_bridge\x00'}, {'\x00'}, {'()+'}, {')@!\''}, {','}, {'\x00'}, {'\x00'}], [{@audit}, {@subj_user={'subj_user', 0x3d, 'romfs\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@fowner_lt}]}) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2966.510141] audit: type=1326 audit(1713662135.892:20499): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.515155] audit: type=1326 audit(1713662135.895:20500): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.517980] audit: type=1326 audit(1713662135.895:20501): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.521709] audit: type=1326 audit(1713662135.896:20502): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15975 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2966.524185] audit: type=1326 audit(1713662135.901:20503): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15978 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2966.527378] audit: type=1326 audit(1713662135.901:20504): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15978 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2966.532006] blktrace: Concurrent blktraces are not allowed on loop4 [ 2966.533792] blktrace: Concurrent blktraces are not allowed on loop8 [ 2966.543171] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2966.543171] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2966.543171] [ 2966.555462] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2966.556851] EXT4-fs (loop0): get root inode failed [ 2966.557277] EXT4-fs (loop0): mount failed 01:15:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2966.590130] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2966.590130] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2966.590130] [ 2966.594969] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2966.596453] EXT4-fs (loop5): group descriptors corrupted! 01:15:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) creat(&(0x7f0000000080)='./file0\x00', 0x6) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:15:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6800, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4c01, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2966.653173] blktrace: Concurrent blktraces are not allowed on loop8 [ 2966.657875] blktrace: Concurrent blktraces are not allowed on loop8 [ 2966.689328] blktrace: Concurrent blktraces are not allowed on loop4 01:15:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x7ff, 0x5d, 0x0, 0x1020800, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x12000800) write(0xffffffffffffffff, &(0x7f00000002c0)="326a12c82d9cd3d593dd203343f2e2c3886876a09dfa0acdc3cd2ec11bd93901bef731", 0x23) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f00000020c0)={'team0\x00'}) syz_io_uring_setup(0x35dc, &(0x7f00000001c0)={0x0, 0xb1a3, 0x8, 0x0, 0x27f, 0x0, r2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040), &(0x7f0000000240)=0x0) syz_io_uring_submit(0x0, r4, &(0x7f00000003c0)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r1, 0x0, &(0x7f0000000300)="801902b8339769eb0cfc6e7f3fda00baa25472b6212668d4bfadc96f47bf8d5b54ae54262a1f8c016e2f95b05956031d4a0a287fabeed9a74ec7ab0bd5dde3180ff064e9addb30d242fae0525a3e3b20b988c9c405e0cd840cd7971f839ddc1c95412595ccdc6b2ac81ed23a9b0256d530d57bce71b590d0e5f1a1c849291491d9f208cf4a", 0x85, 0x100, 0x1}, 0x1000004) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:15:36 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) fdatasync(r4) ioctl$sock_TIOCINQ(r5, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:15:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2966.755602] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2966.755602] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2966.755602] [ 2966.772161] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2966.773420] EXT4-fs (loop0): get root inode failed [ 2966.774168] EXT4-fs (loop0): mount failed 01:15:36 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:36 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x6c00, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:36 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/power/image_size', 0x4800, 0x56) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000180)={@mcast1, 0x0, r3}) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000ecf978d4435a0000150100000000000000b666cceb53f118d938fe69326d60398201000011fa3330a12a5cc487afe7fe8e2bf410f166bd8a6b06f2e9bdc4311935c43a45ca9281305de60f8648e88917894a2c2241197d267baf7f660b2c480df8310f2767b183844a165c14ae6a72b4f5e621e2294dcb145734dd36a63bfc66f285b437daf07935bc593f90bfff7f00000000", @ANYRES32=0x0, @ANYBLOB="063e9c9c10000380080002000000000004000400"], 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syzkaller1\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfa, 0x0, 0x0, 0x0, 0x2008, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xfff, 0x6}, 0x0, 0x3, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:15:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2966.847946] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2966.847946] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2966.847946] [ 2966.853962] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2966.854739] EXT4-fs (loop5): group descriptors corrupted! [ 2966.867319] blktrace: Concurrent blktraces are not allowed on loop4 [ 2966.894531] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2966.894531] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2966.894531] [ 2966.899413] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2966.900681] EXT4-fs (loop0): get root inode failed [ 2966.901100] EXT4-fs (loop0): mount failed 01:15:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7400, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:49 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:15:49 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="012000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc888092c61bd6cc19bd10376b95fcd5f85227d97cbc2a29604d80db80af85d138b489ae42a9d4e380e19f82e40ea31a62d20d52ca9d9619d938b0c6d20f24cbe493f63658053533947546f1e5f29f8740cc7e21917ba271eb32440b87300caae8522a02c948221517de3a3719fd5834b46a402f10dec019fdbaef1bedefc1cf4d6519a265f779c20c04b7b3adeb1afc451a5d38f5cef2f272c688dc3dc2aabc2ead90bc325667132"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f00000000c0)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f000000b8c0)='ns/mnt\x00') r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x4000000) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) [ 2980.449667] kauditd_printk_skb: 119 callbacks suppressed [ 2980.449677] audit: type=1326 audit(1713662149.855:20624): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16048 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2980.453256] audit: type=1326 audit(1713662149.860:20625): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16048 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2980.455286] audit: type=1326 audit(1713662149.862:20626): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16048 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2980.458244] audit: type=1326 audit(1713662149.864:20627): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16048 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2980.466820] blktrace: Concurrent blktraces are not allowed on loop8 sendmmsg$unix(r2, &(0x7f000000ba40)=[{{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000100)="c4fa951c41", 0x5}, {&(0x7f0000000280)="4f201f12bc98cf8d931f70d6e33bb9", 0xf}], 0x3, &(0x7f0000001480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r3, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r2]}}], 0xb8, 0x1004}}, {{&(0x7f0000001540)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0), 0x0, &(0x7f0000006680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, r3, r2, r3, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r3, r2, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r3, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x160, 0x20000000}}, {{&(0x7f0000006800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006d00)=[{&(0x7f0000006880)="34193b4716e7f30ddd8011fb19f62a8623414679257b21183a", 0x19}, {&(0x7f00000068c0)="98a663a93ea4c00042b76d9e3a848d1b00361cb511604fc0f2674e5d162116c98fa3b349c602cf486b1b3a95e6c6d286b57198a093e9ff436204512f60ae6cf437d5245a3427f8c90a0f2889c51a744734bfe40a665ff58955cf19108b8b911ce94ab929bad0f00929cbcbacd2e0a3815c0078cf8f03621e0ddb1a7e8d650824365f28fb4a23877b09952fbd415d2f849de4d4c4701e6d7b55973d8a9ef7ba56e160c2845dc9c512bc1d9b8155c79f0eabd33452fe23f778a86ac85cc59a82074ae6e2e952c791b41d425c1e", 0xcc}, {&(0x7f00000069c0)="14c94c059d2ebc6c5be0bc51cfd4260e32f4c36228d8f6921cb9c4337070959161480140a9f025e8d0e9058849b9fc6bf97019837742fedb3bfe19243f727738112e693cad342de1ab15881b1042b1456143f549ec3c5d6881687e47bf5677c0e40337a5dc413be252df9dbeb6876a19a6169efd05713080a70252044bb1ef16cf279193e55a0aa7f5e7f471b5c4901a0a052a52b68452dedb511e7149eef600f5341892b5a805dbd78d491029d35fbd5cb6cb2fbefccdd39cf07cdaeee404948c56ae56e99803d03378abd10bf4a55581ab99ef16f71f6425deb6e758b9cc84c2fed34f27f9d67d44", 0xe9}, {&(0x7f0000006ac0)="66b76c078582b5c13e2b3d7b6b8d1818e51622eabb82bdcd6567490a51ef56b3af0773035004e9c26e350d26ded4386dd8a3c54796be4e52c8695bab9827b47c7d2a1127ad686a6cbdb7a08955a3472280b1ce1f7e15becd15bd867818a654442bcd865f1badfab631f664521e65c051ffe02ce47508e098bb1ec57a0fa530fe1d09ebd118f8be51d9f67d82f83ad3aa9b369866339c41242046b8a9a522236b3fd943bcaf768a3bd18a1a0beaac5592ac3a51ac1a4121e06416d412d142a07b886b04bf9099e76158b7784e46f3c8dff6efa5e573ce4f6cc3a7fc1036a142ab3a9c51f9cc627b088b1090cddb43a034972669ed", 0xf4}, {&(0x7f0000006bc0)="a45676eda8b9f4f8c773e34ae86d0db7fc0af7eae0a60fd253c6465aee6385fb8450418d5b8847a796a54a1f47201baab91889efc514e71f13f40d37f7a134d8ae328ca3897b7611c20ccf5e1c29f680d3b0912f6d68b6c235d145c920d3819dbc6ae1af1932bf6ca3e81a33d56964f8a81fdc4e3b965a0273fa3db69b2968b398e5ee63bf33dab6902526ef5ed839", 0x8f}, {&(0x7f0000006c80)="b1b1e134d4d9a06fb29b4d1a19396741fede4d6cfdc21c6498a192d74d20b8671e22f4a8bf4663ddb61255ea18b33870ff6bc52172c765d45d7fb3ef0f8a0e1cc27f567b4f8a5fd1ff2be8c3c73ec4a39499ca2de3b27e6660094bfc12cb55ddf327a31388a68d5d2ab320205df56063", 0x70}], 0x6, &(0x7f0000008a40)=[@rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x400c011}}, {{&(0x7f0000008a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000009100)=[{&(0x7f0000008b00)="2043cd32b71fa8951a3575ed973a9afc03723063162d02e5cfe52ed451892ae2c3c7460141f5bcd0a7462de13c8ffbab4da869bdd143e1811917ba20179104018e4db4ffc63ce83d37ec9b969ccdc537f3e566a0e76297ab99c7ea7da1a2330a6161904ad45bb41394f75dfdbb250b9a52eeadba2974da04e7f9241d5e19b535d016ebcc0b7785f49b78617d2f4bcb8eb05c32cca3ab0e19d8fda4e2e93466ddf350517186ebf832df7b6594f9aabc5ffad14d", 0xb3}, {&(0x7f0000008bc0)="2ed2f9519fb767b5834763716e472cb0d49e0c931d7403e5624de07d9cda51260a02e04ae6ff2efc884aff02bfb266e23b77c15cae707c90b8a42e535e9107977c9efa3cc4a139c500cb1e229b93a1adca5240efd8cefbb9f35d57085d01082083a03e3a12c4282d959d6ffeafe6ff3f96b57db4d392938463e172e9ee3560192e26d918f8dec37063d54bbc5a050aeb5d1ae95b16986e838fc71df2e555929e8908f59e0bbd8a458c0b9bd09b79f5d17b4ae309c65642c215fb6f36be10fec46b3f", 0xc2}, {&(0x7f0000008cc0)="dc54367496f924eed8a3ec3c18c88a8dbee88cfc67b43776f41807895149796b882042d3711b0e87e6edc40904793b935d689e031b33ec7992e4799f8b790824b95cf38122a1af3b3208de48ce3e9e62727ad4a6a3428b9772fed1e089578db2329f4fea83e35c287b86eff57c96316640236bbb4175079c226a091d606668ae9f39e3c3150faa2cb3b22294c346c7c3d315add5abf30b60e8e144360d2e289735e9a104cbae111363f05f47b5fe4ea3fa64531aa350ea6cf0", 0xb9}, {&(0x7f0000008d80)="c0d74ba7e8d426f0ab70a5d45cbb7e40bb594be45629cc59b32b153d354ec070e211093d9dcc5f37af0aea249d743a33a33e6b8ba3f82541907ecb34b2a7f8b64a2f11dd17df6da4d8c2b5380005ba941286", 0x52}, {&(0x7f0000008e00)="6b50e2c23e63e2bf1c846e563083aba450ec8d8ab568363d300045c03ee5100856e579c75682af6e49846fa2cb64b834ff9ca8657dc3364ded998c3483d606dfdf688dd4114e6a64a6e2e32fc863bcc18c300a76b92e58a3ea84c67b02b80ae17d6add9be01628cc269508cd793b134f748948af92c678230e633cfddbcbfca849f543bde65d72ed75e1f48d15e67f2b8898f4391d62528c98b6e342a14b9d9a1b4cefe4494aeb6589fa6227ffe54ed1f6ec9d19a5109dd3d32916141c85bc23788ccb1effcf37dcf4381c3af71dec1d1c2a9777d6c7a9dfe31913b1d2ead83857c0bc8eb868eb2dbdf8db72de512fb4d08dc2b18e2d", 0xf6}, {&(0x7f0000008f00)="3dae34fe02a4709c434f17c2b1ea981a34e06d2b7e2e5566cf252d7e9968edab799e58b1461b1928dfb4ab7d9bbec9dbb9093a5f49a39b4de3f11497f2fba53fc4ce52ab92bafbf71597189c3cd3341258d8afe43db35a1653fe87f9ff270d51e3faacba5521a44d8997bead302270ab74d60ff56d412b2351dcf9aa67fd15902f9982090c987cee78a57c9b0b585d9cadeeb505ff85599bca18e56d218f7acbbdb0332c7759f9002e3c37c4b5d5515e783f3ad0537d3ce906d0d34172c572547f77f8596625713cb12e1321423207dcf0897d7cca24f5073ba2dac92b82eafe88fb6302bbf101caf1d58b8236af8b2319", 0xf1}, {&(0x7f0000009000)="6a1fc2d95c8b6ba0cbcbdc8c04aed9c0814b9408ea31139cfb1ea0d244fd8580a5ea78978cefbfbd960da6165aef3ab90fd45722bf825143bcceb7ad1c5cb062eee4e878608fbe96a23833040f5d47a6eaec9bc08f7370e0cca5a29df60efd6489aa99699ced5aced43cd9eea76b5ffe76331fabf8163deadbbf4491c0392b2f66fa7291db144d27e46e5271f03414f5067698109d18337b59d54699ffd165e6c141981896de2240d15945f629e2728b0cdf64c1299f2a34d786365dafed7896e839e6290aa5f6651d58bfd624f441f3db35fba7c7a1b0ea69", 0xd9}], 0x7, &(0x7f0000009240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0xd8, 0x44800}}, {{0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009340)="2139a29490732fe943eb3a02d1413e085f1728253b532d2feafb6f9bf15b7ae89a683deac3f2214fa35cabde3e6ef3b8b058000f274d83c64f99ec5a5466b70544bcfdcb7b53c8", 0x47}], 0x1, &(0x7f0000009600)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @rights={{0x2c, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x140, 0x400c8d1}}, {{&(0x7f0000009740)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000009c80)=[{&(0x7f00000097c0)="fff8fe5327d04672e2a666bb4adb241690b9284da874ab3324ae16e75cc317321f96f38b8772782b60d8ee945864f93fac08952b13c932fd0eb94080aa301ef30d3d47f5a1ccee1630b7a0bb299aa80c33843c264ce0a23e561fd39a2fcf2cccdf1770f9c0a0085c0c7f6e24a6f2d68d6931f5afc44bffeef47976c907814c239093d951260669e9a10330d5dbc5bb47619604017637e290291d74fc42cf6476311d7191360decc9f548f57435b5dea1963ee5310aa23ecc7ca92a4f8856c55a8083951c54386f0b163aefffab77c2780085bab27dadf6a520ced1d7a1febe0405512f037c8876a5e126e6aa51e706a38b", 0xf1}, {&(0x7f00000098c0)="fe33f0f1673a6fc3e3469a0cc769e452733dad829358390ff9061d5933006d877f11e7c5087de4ea3952b18fc07276114f6e0bfa124c2ce9d2620908ecc3d44a57e1426defae03d7e0b062603b2a20224c99aa816497cfcddbc48ee56b5d6d4d343d975474d88a892797", 0x6a}, {&(0x7f0000009940)="ae7293730d72fa43148bf6d87f2b1b2bf5af19c748bf85bf53b0149a75abafe5a869e07305b20ca950de096a67155f95f524c41e406f4199df2ce86f50055760e790aff7e98365132e1517da2b3af832968e834da320aec03806c447a333e43bc8f35f1029c5743df7bbce3a43b3e6fff0c66a2a8b19b51a06192b3387241518e9171a6e77017d415e29d00de31c7b653d3d1b5f42f31d5e268cef30c0e7dbf887d8c9ace26843178406668c2cb2af1541d3772f46c1f02ba64d830bd85c6e6411", 0xc1}, {&(0x7f0000009a40)}, {&(0x7f0000009a80)="e10035810f2d990ccae0c28bb21ec72e90e9d66d117d4b1655b66704ffe4861e1295d57187a2117b3b415a6355041cbeb3343d6d9af0b68ddd6ab1941d7bb079fbda94d5654caec6c9eafb1b081f4196a859fbe7baefb24bb21f81368b4074205eade8087993b457b87bd47caaa502c0c5e9d08839895b239ddceac6910c57a0f93a9a5582175d39db9d0ddd909928d985e6c844e706f81a0fa28f4f2456ff2c2e2f5dadb71e319d163077b8ab1018b9edb3c0c24f86664379d942ed719374bbb84bdbf5f1eece86ac1dea8e5251082a9ab55b6ba0725a4d98d7ce74294b0ce965539bc1a50e627e19deb8e36ceb", 0xee}, {&(0x7f0000009b80)="42d48ebc52873332aa5d28af9f51d72b1ba6f9fbcd505cf41fc3568a884e16bdb3d7d77fcd329f5ef9e43f1329c3a955769427541820d6d014216538f0d5ed588259b9b721aed9e41f93cea10287af16ed443773b74ae98e4bf130a60541b9f7dfc5ce2717dc6e3940fb4b89131953e2d442cd4ac4f79e0f8669d818cead64ce6284c9b8dcf4f082d99d21165427675795b6ac4dc76ec7810a2a1f032961cb7984c3c2edb8271ee74e3081eb02946bee11dda0c41222230fbebb5797e3dbbf7fde44f82262cd16457f11eabd5d1cc10accbc2b2a64e6fb399e9e612de0d50e9ae4334a45f6452f6d3ccce178", 0xec}], 0x6, &(0x7f0000009d00)=[@cred={{0x1c}}], 0x20, 0x2400c800}}, {{&(0x7f0000009d40)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f000000af40)=[{&(0x7f0000009dc0)="26a59cb63c2f53a8dddc1d3c29402bf69738c21e7a3b17deec57aba10882c7ec3e40", 0x22}, {&(0x7f0000009e00)="250f5f447ce186e5d1e0382f2c2a4c2d979b739087ad93866d305397d8e4b96281ec3570be4debe86a0b69951d42cdd94ff214dda7bd2439d48a3ee63e49f1a7bfd9bfc0684108f798fb9ff5d8edccc60acf614b3719037df580cb6804ac4ef25a185bd4944510345b606925b2e24d7d6a049df44eafe5b7ca19fb2e87f541c99d814469aa23b3419c4bce8e49784a0994255810de025fdf6fca5340a7689d11f9a40756f200ce99e5c7fa611169752fefd66e0e597b77cdebfe58d778e9a186698b43d55c98e1dafdf892a176d6eb3afe5e2d30c61435991be801dac23e6bbed17c71340cb2299d93a4b3a6d37e9a8885704f6281882e59c82cd5c5e4ab9123a50cc0c1cafc6f4639dc1481db2ddd23eb0c37a62bef49a0c0a07ad3b2f37d7a40968ae3c0412adeb1b00c9b53cf77e8201603670745b4570da885671ee8109f9419afd339fa940bed76fda769d1f58719181ab9a589d7bff2974e829943adc2d08a04ebfc092bfdee53ec30fe4f838cc1989f908c77887dd506876a501f752fa712454f5c27c7b7f23d1bf0aaad2929ce8c9447dcc7d5fe7c062dfac91f9380b8fccc9d21efc3491daeca7ad52e4ce26de0b5e5f1ae02882ff6b06019ad628436cbe56ecdab202cc0fa0a7ff022b6991dcb7755adbd7a1c23224b22536d33f0e77b1f40a2e662cbf9784e4cbf80ed6bde9a5ba23e3667621b445de5f1f941091c2a5402dbf5ae69a65b10ce9919e767f7c7795fa92b9450bb9a426442a6a9ad31ff8b13cd74aa736ad32b652b0793179ccb89ca55355e0551d3d6b1380a0ba73bc9f4df84446ef5820340be293c634cb67305077fda0217d2dab43ef5cd391a96785c979a2c6ea99f2bc67bade571445e441a8c989090982e41ebc514b7b10578f6085ddd775ff2893e9ba5ad1ef9c522bcf0ed0d80619b41312459399b55e8028e4cfd89e4be6dfa1cfc05e895e69d501a4803b6246db8c9e917ce272420a7fbc8b4492b01e35ee8991c6342662acd89d4bf341eb363ea46bb29917431ec531b6134217860fe1767f2b0959a9e77c715408cfe4302c6d1964db9f5b55d91e60fe6f14da30ccf4d2a16a56f4f662930e08b38ad7e53c39967fe3289b73b9f51f23a9dd6f88a0591484d3cb93a2de1a80b5f305228030ec55b6baeeda497c664940dff967c7fd2f1a9047aaa30d39290178b2c7568b29d372158c92469ba6008587734cf03ef203bf3e75b8f6bd3f12526ce1f8887e3cc2f4a19fe786e2a60b2dbe827dbcdc26e41493add3e948ca0d21b7b5d10a392ce6d9b0ea6ba8dbebd8dded18f2ae7a18c4f123fd88d2b2e236e001d47f28760a3b105499e96499558b6275505440ce1225b0cb61a151eaab0e13f9a5940c1b37eb8646f046d82b896d2e0ce231b5ce56a552861acd43f9d5abadfafa810e94d5f7b1e95ed79b42e1f30c4e2ddadee064be38061c78f23023fffc7c4cce2fba595ff43db76be1cb1eb5ffcc6fa06599e7f8494727d22ac6ed4bc1c698f4a9373a728b494708f276e1ec9242ba0d3388ace083eaab86d6e9102a5feefb03ecce4e2ee3506ea6ba471dcafbb6b8d086b161c43923227623d512257d0d2d7defa9840dcd6364b9e3615812224b2e2edfd31573703757f2a7f0142fc7d65b37d112cc8bf1420ec1549a033dc9c0f5be25412875170dccdd0f7f10a7400e3d80f05e9b95f29c67dce5b6549bae75db5e21ef60a42ddcbc44b7bbadab6fa42e19ed49c7a509df77b2fcdd0b029d847f837b821a607f70015b18c7c7db88ed1bb309cbd81ac864dbbe67094855d492cad32f5a8bb59971a9bd50f9acc6f4a0ce594d15cbf15cd9730eeb444a93bc77b0ef8e3df047e98603eb824477f7433bbfa18babd89c540be04f15498c2ef1d518b08aa918a0f1b65290a2d9e363409b12ae3d5fe5b6555f79f6eca0078118bf03d534a9c310d04db7639d1cda2bd3bf3190c5b2eb08341c5bbdf9edda214916da8d069002a892912ef86cc17be8d8155040af00cf6b3a2b16323c14666d60a7cfb2ffde31d72c48fca1ce8dc304b67c884c394f14aa9aa3900378b57f962ec35b3dcfe2525ad468556e8a14c8a6f8806e63dc6eb25545cdb443276dc6cb69f221eaf6143ddc38a7a3610bb6da3cba436579cc9868e42169ebaa26f4a095b8a1efba3d2280c93ec5fdbe6159303867b911e34939959c0a235b0e46a6751f4c55051f275f3b7cbcce7ad4e986426e8d521bccfac619769ee9ccec171bb1a604357d756fd2512b127ec93438faf53a19fc6627456090ca8a408dfde394ccffa16e75e19ea21e2dbc61c87c3700aff3fd658d239f8e09b75e87b9992ebbd2d9e8335fa73abdbb345f6bee8684d7299bf7e21b73b431028de1d99a116f5eae1e2b922283d94bf14355d5b1fd1b5c3eb65c6babac814dfd25379affa6e8ec58becb7f5d1f0dab035dddbd19c3e88adaec934c314ad753e02fbe392238cfe236fae216bf4e36e1d2229cadc06c434b8d9ea1b529f2fdb2903f2e376907fb0ef493fdb0018acae50d8fe1ee46eb2947abe0a3e632d018c8b873659692d364b5e4eeae431733d2a9ddc368c67812c9f451e4c37a7ee268ff04454c248167a1e498dfe30ce5874f152698f69034d5a3dee73a831ff8773137ed299ffe2d203d8150d9ccd4df8571c1263a4c33fddee7905bc1a07fc7b3075a937af73f70a3b071945c7bbe550b518fd5e33d62634beda6a31615a7d4db43034a1f304fab03c000f62b710092962cdcd1f444346a4cfb52b1fea93e405fe3cf024692dfcc9ead22dd57755040d056545ecd62eefe8cc3c3182c7e0d0012d1e8b3477a297b13a1c2bc24037dd937dad9fc72b0dd319f0a4bcb0f1042675e4ef65d1c5da2d00c70a9a8fe36617829c13f99bc782ae93795be13ab00860c4ad9ef9fa82381f1bf9098ddcab40f1402b27b138cebbb052cf83d6cdd7f1ca6e3a2850f13912d099f7080cfbbd6f55564f696db3cecff958d2e8c2153234886a21fb7f95802d24a6bda44649fdc62da2599b2012bef8dac9e797db9b882dec818bf176d206da74244856caf9826a59eff1242d7503962145a3a02d011be877b5fc17b0664cd0a4e7a579f4ca74b831d44bda43e6c8df973e40ec53b1027e727d7f6cda76c34c2224dd1c852636d2f2fdf0201ecceb86b4c039f5d16dabcf273d06e500bbd452c881d48969cf06fcda44ac08d1d02b368bffffadb6ea4061ee19d78dd67de4c5afea0eda859e69132c630aa4039a2e20faffb58bf5ff559e21e0967ce54c15767c1c213ee7cdf1a5d9509e5ed3d6d554d45ea3a7b757116e549fb56a29ad1c60df3d50f2f384ef42e6aedd574a79bb151995cdb0e2f617100e8532796c6097455f7809c13101f0334d341972d37db4649cd63a3763518860f42e2ee523566c2726111546e6c680baa02aac29cdad5f6d5ba0c48e75173129597f7ee16882384cad9b64ec2e2c32ea40eca64f803fd04f1efe2493ed9cfc7440a5e8caacdce5abb29b1655f9ef7f4f77ca9a91cf7e39032a119de3d99f2e324d22739a57ce40e290f0c7523a98289020dc5503433491fb86865c3ebaca2a844a8f74e1a9c5d525e6c7000e106efb498a51e7a4ac1ac02b6a7ea039fa70324e192a9ffac96dc72be9e4d1e3616c555aac2645dc69bc7a045f485852c1afadc2a7066f2a934a786d050f7acf69f88eef02d14d543154bbef79cfe10ca2e48915b7ca9d42291054e915e19f683fc55d2f92ab982b1534e245d8d9d4eafbe20951f7fad2126c56b5d47f96e0c8140e917aa01f55e01df1121c79f595eb13bdb84b28db52fd1b06bf300753a9d18932868680a8e9eb95375131a57f8426026161ba5462e725e5006df4f5dba36bddeb6329169a4008dc6ad5c0759a33f1f0821d6cd103bb1064d658ad28736868dd5b0987213f47a00f5b6561283490f5545681a0461df4066a900535e22b0050092f835c589669b8c772a56c6326b353c013ec6ec60abdc11a7067e350489b25603042244c094abec7b4f37ceb22daa3500d3c7c97b20b46973e0e428633d1c222c8ab8806530f41fabe80036d04bd30b9a9597d08d95e24d1161a6ada88aa67ab0cf7b579c26fa1dd57304fe9ca6c956895637e0f29287e772aab5e62fa17bcb8ed88e3a19559a6e842aa8a32233d981f257de61955897e8e3a52f159cae7887002ff9ef905329d77d61bd9c5d5038bc8a142950bb222564b2c7db1aaae40b528f294aeee6ed5bba2996509cb2f1306bd654b5758457f645f4992fbd28ae019b8713cbe967e2c89bdc344b44eed01dd800e856207a020af2247a712fc8c21be218640c18cec6c75453adf233407beeeed06a3c30140611694ad1e57087a7bac4340626439609c8d40547492f4ee2b74c48e639047bfa3a28c0797846cb374143b789e5c59edb64f7b283995c9e2728c8d4d4cf6177b35b906d0e467cb6d13ce9fb5f3e4ceef7e0b3f924284e97ac1a4d8de5b11e019bc380fa5831934bbadcd02bdef10a55505913bf12e0ba6ba4cd96b65b02fea11c0ecf061b0b09aadf2a790ae1580b767aabbd3492accc03bd78a6df918b76997485cadccc031ba653e425125d0d541a4dd378a2d72558a7e983c9831438ba9c1804112586de4a0acf827154fdfec77ad269d5571650cf16776f4d670bc6499e87b478f7df34b07f7be8b0f0695050bf08bb6e774794c9180b3231f8340952474115176b32fd5fed7739bd9512fba5d42493d816a6e93f23b6b6c2f61ac3467f471016399029d055c5709d0cd1685d08f60b3fdf168c0b8fda8c96bbc19e47a4df321df805e1cc0ca327cbc10a9a48c8133fc2bab3c478e7fc1d4e18b24b9ef8bb1997ca67592cc849f22d51b03a71a2ad783ec02226f3b0e5efdda3e3a87c3b09c9dd04a34b53f787d6fa116edb683f952bbaa71651db458deac51e92c1d5a168b7bd2eeb304546ba3829765af9179d83926b3dd1ba9fb26faa6d8b5a4e0ff69235562368bd450a23a512a2015e52102676984bde3a007de44174d9335f942012cb4d7a862bfd6d9f0e7f7d50fb66acc86f31eab56b9210b83872c529ca1b72e46d7e2642523fbd236db16b3312f03f930b4ebdbbdfb0511de310125a888ffdda6a8871366401ed25424de6b1f42b2937d2ec5a74e508a0639d71755301d25f13e83fba504654ddabcca4fac7ea6d0e6c2395bbfa492247fb8208260d4aae5ed97c8aa490344c2092c051444ef5d1a8b19f1eef0386981f8f864b038ac4a66becd648b84878f22b0239a76789b94757a0017c509dffd97b2050abced0d0531b8b2588b8ed8318bc8267d6144cdfa0cd921cb0e14729d7f160f7b61f2768faa361048cb37f65065a9f4fc64c7c5493504fb5f479141328f9d7ca5b6da50fff6e1ef57ca346d7d4dfa85d4c66213ed61ecbc00fd017423fbae645de00f8d784db22834bfdfdc101e5f4dd4adfc28dd469565d00454bab0a1940fcf0d593fdbf0843b420c59bf5da7fd39f380e0112036257afc19ec2058a894c72a959ad0b82b2edb0dacb8f35547499149dead5a3c0db1a726f774f296e600fddc4d9041a31ae13838ec8a94a269971b9271b21a32ed2e2b183319ddf5802e765b66c07856528b8d7c8bf08d3ec6d801c832c6bd7cd9c671ca56f345408ccb798e57905c15e1689bdf982325a0c8ca2fc11a66929a8665b5de04c8d666b04c9c070985febd86bd729e7283a73f211f38e496649990ba82bafd4beea6325ec3a7cf3b9e4e88fad1a2cba97b4681ab0c0c1dbca491", 0x1000}, {&(0x7f000000ae00)="9c9ac9305122d62ca6d7bdf27f6d03ed678eeeb105c88e9e31fbc290a1065186d8dc11db89d8371805258951dc274769eac80790290a53dbe539f0223f60dd57edbffff0f9c73beb", 0x48}, {&(0x7f000000ae80)="b5da532162d951a47cacf731987cbe00a4503a84b221fab802721460cad0be9c7a4e116a53888a8b1d97ed681cdc13907fbf459c4b952414a98599b448c91cb71a3b190f93d7b32c9959fcc8d45254c685032beacfba5224d9401744ffb0191d62e3e36d184a6d705b58921a4995c83bd6362dfca4a2f69e3cb64a1f81eab121ef1078881e2d", 0x86}], 0x4, &(0x7f000000b080)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, r0, r2]}}], 0x80, 0x10}}, {{&(0x7f000000b100)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f000000b500)=[{&(0x7f000000b180)="9ada6c1dac077ef7c93f9afff132a31f1710a154f9a2dc735cc88c7bd27abf6520cf3088ebba3e7fa58159751e66b2e8cf261f4cdbd186219e80c9c3497b495bb1bb7eb4a52bbcf2a0c014b005ce600b43fb5952cfe693544169d76bce2eafb55df826f993424df770c1d0ceee0d7c01", 0x70}, {&(0x7f000000b200)="c1b0035cb1e301d927e8932e8e701aae03296e3fe019e669c22b57a2107054673653bc9db05dc537", 0x28}, {&(0x7f000000b240)="f63bd21ab0c0f9631b1c50887f426d5ded2301a657bdb20d1856c3a6efdb5c2f291ec0bb4c4e03773ef92f66dc4e6212f95b16a9b2ad723997b01d945804ace536fa48a6228a00cb801ed280c939b0c72d905b03f343", 0x56}, {&(0x7f000000b2c0)="bf63f6f0bd4c56698f46ba51056954927d90eb68a2d55d102d5f6a72079ecd54067d2d0fe074b40b778f0e3217cbd09532e73ee1b337fa4c5af5614bc7002518ea94604b3cfad2b6ad213c78d11f97bfdbe432b746bf69bfe5b4cd55bd858a856f86dd0fbd31baeddce4b450efc167f03b43b8138578bfb44b65692a9a83eb303cdf95d5ebfc1a65eaa2bd855ea3f0e55caac98be93062c6f00e1ff88765ddcc902e00368c4adf4767e04707526b1f85c4a016e15134a18121", 0xb9}, {&(0x7f000000b380)="e3928d701e3ec8b4ff7057e55d3e0bf1331c2751168b921a91a91100376820f9c97ca7a5027e27849081211bbeac57f6156f1a0943ca7ffa4fbe86982b1ca236b9d1a0169ddaea754b9a6a6093c4c1566aab4dced79d0b1c91fa5d502bb67ad752a0c473f2b251edf0fb3f39f3d9a9e01c16acbb004cc347a2de2bf38feb41d7d2a3409ff13bea5fb007adc273cf2a5f5ad4ed4eda3e6b0bea2ee395cd24db18", 0xa0}, {&(0x7f000000b440)="518ffc7ef4953bd4da5ac020ea02c503814eae21dd01efd5da05ed85094a929ddb4d03d033e5003825d51a96f11555c26bd6bd390af452af023510c10a6030291183dc738cd56579bd78ac8dd49db322d06d5043b03c5babea8b633a9ad638ff74c72e7782b07fe457df1a223f3425df85e0df0e96a30dec5984bb67cca23678d8341864b90324d89f715117242338bb88bee9", 0x93}], 0x6, &(0x7f000000b900)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r4, r0, r5, r2, 0xffffffffffffffff, r0, r3, r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r6, r3, r3]}}], 0x120, 0x44000}}], 0x8, 0x80) openat(r2, &(0x7f0000000080)='./file0\x00', 0x214600, 0x30) 01:15:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:49 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:49 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:15:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) io_uring_enter(0xffffffffffffffff, 0x5abb, 0xc71b, 0x2, &(0x7f0000000240)={[0x100000000]}, 0x8) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2980.480970] audit: type=1326 audit(1713662149.865:20628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16048 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 01:15:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2980.487333] audit: type=1326 audit(1713662149.865:20629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16048 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 2980.499236] audit: type=1326 audit(1713662149.865:20630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16048 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 01:15:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000", 0x8, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2980.503429] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2980.503429] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2980.503429] [ 2980.503792] audit: type=1326 audit(1713662149.875:20631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16052 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2980.503863] audit: type=1326 audit(1713662149.875:20632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16052 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2980.503913] audit: type=1326 audit(1713662149.877:20633): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16052 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:15:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:15:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) r4 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000280)="eb4679063801edc78609bcf2ccd0dd660fb5007a5ae53ff39e23137634e4e531b72f2875a6c25b8a85c666702648deb98d04672b40424c1940ed408618e4285273aefa19c709f0ba07155a4544ca3798a83064d47e87192591778aea0f639c0474afd7441a549b9ac3c309f0c28d36b7024cecf66988c2f578070bdb1966862d09571dae2f2b4b0e191579f45f93d8e02d97f162500efcc2a90965ac0e013fd588791639d0baee3afba4e40555f43d490d3cc30118ce46e1e9ea4ef6f5a82554d9ec2f4c3f79750e05d0fa", 0xcb, 0x4}, {&(0x7f0000000540)="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", 0x1000, 0x6}, {&(0x7f0000000380)="595eb576597bfc31393ea954", 0xc, 0x3}, {&(0x7f0000001e00)="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", 0x1000, 0x46}, {&(0x7f0000002e00)="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", 0x1000, 0x75}], 0x216800, &(0x7f0000001540)={[{@iocharset={'iocharset', 0x3d, 'cp949'}}, {@utf8no}, {}, {@shortname_mixed}, {@utf8}, {@shortname_mixed}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x63, 0x35, 0x32, 0x61, 0x34, 0x32], 0x2d, [0x66, 0x37, 0x35, 0x37], 0x2d, [0x62, 0x39, 0x36, 0x66], 0x2d, [0x32, 0x31, 0x63, 0x36], 0x2d, [0x39, 0x36, 0x38, 0x32, 0x35, 0x3e, 0x33, 0x65]}}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'romfs\x00'}}]}) r5 = openat(r4, &(0x7f0000000440)='./file1\x00', 0x800, 0x10) r6 = syz_io_uring_complete(0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000001680)={'ip6_vti0\x00', 0x0, 0x29, 0x1, 0x0, 0xff, 0x14, @remote, @empty, 0x7800, 0x8000, 0x40, 0x7fffffff}}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000180)={@mcast1, 0x400000, r1}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2980.504239] blktrace: Concurrent blktraces are not allowed on loop4 [ 2980.522557] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2980.522557] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2980.522557] [ 2980.540206] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2980.540532] EXT4-fs (loop0): get root inode failed [ 2980.540538] EXT4-fs (loop0): mount failed [ 2980.545303] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2980.545440] EXT4-fs (loop6): get root inode failed [ 2980.545446] EXT4-fs (loop6): mount failed [ 2980.592063] blktrace: Concurrent blktraces are not allowed on loop4 [ 2980.606100] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2980.606100] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2980.606100] [ 2980.614192] blktrace: Concurrent blktraces are not allowed on loop8 [ 2980.624579] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2980.625345] EXT4-fs (loop5): group descriptors corrupted! 01:16:01 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000280)='erofs\x00', 0x41014, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3ff, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x80000, 0x8, 0x0, 0x200000, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8982, &(0x7f0000000000)={0x6, 'ipvlan1\x00', {0x7}, 0x7c64}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/kprobe', 0x4840, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@mcast2, 0x49, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f00000002c0)='./file0\x00', 0x80, 0x1, &(0x7f0000000380)=[{&(0x7f0000000300)="9a68b35b8425a20e480c37975bb094854c5de1536f3c5e5e56fbd38814e3740fca76f88ab99473cdeaa66d77cf4ccb67c62f416d352900f10f40e53d466c40d5c5c6bfe763c5fe36b76762b3b4a248d1198a681b20d0871acb48a0eba8e5dd4626", 0x61, 0x5}], 0x0, &(0x7f00000003c0)={[{@iocharset={'iocharset', 0x3d, 'macturkish'}}, {@uni_xlate}, {@numtail}, {@fat=@nfs_nostale_ro}, {@numtail}, {@utf8no}, {@shortname_mixed}, {@shortname_winnt}, {@rodir}, {@rodir}], [{@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@permit_directio}, {@fsname={'fsname', 0x3d, 'veth0_to_bridge\x00'}}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0xfd, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:16:01 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:01 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:16:01 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) io_uring_enter(0xffffffffffffffff, 0x5abb, 0xc71b, 0x2, &(0x7f0000000240)={[0x100000000]}, 0x8) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:16:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:01 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7d02, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:16:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x80, 0x6, 0x1}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000240)={@local, 0x5c}) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=@getpolicy={0x120, 0x15, 0x8, 0x70bd29, 0x25dfdbfd, {{@in=@private=0xa010100, @in=@private=0xa010102, 0x4e22, 0x5, 0x4e24, 0x2, 0x2, 0x0, 0x80, 0x2c}, 0x6e6bbb, 0x1}, [@algo_aead={0xb6, 0x12, {{'rfc4106(aegis128)\x00'}, 0x350, 0x80, "741571c51142e4fdaf26773f8bd4f2dfb87b40d84b93d49eb8fe74fd8b6b0a865a7149e8ab2520fa14bd9e96dd3fd1bea287677cbb4ff2df30d5c4aa473afe17e32bdd4f45f812f6b77ce14f3b484f2e66270fd18ce13c0d0f242be36b3d58c0373654f895b0e77df25d"}}, @replay_val={0x10, 0xa, {0x70bd26, 0x70bd2b, 0xb4}}, @tfcpad={0x8, 0x16, 0x1}]}, 0x120}, 0x1, 0x0, 0x0, 0x808}, 0x20000000) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:16:01 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2992.453814] kauditd_printk_skb: 80 callbacks suppressed [ 2992.453832] audit: type=1326 audit(1713662161.860:20714): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.459128] audit: type=1326 audit(1713662161.861:20715): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.472921] audit: type=1326 audit(1713662161.870:20716): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.487135] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2992.487135] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2992.487135] [ 2992.492025] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2992.492025] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2992.492025] [ 2992.497247] blktrace: Concurrent blktraces are not allowed on loop4 [ 2992.501807] blktrace: Concurrent blktraces are not allowed on loop8 [ 2992.509234] blktrace: Concurrent blktraces are not allowed on loop8 [ 2992.518942] audit: type=1326 audit(1713662161.870:20717): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.528287] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2992.532713] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2992.534268] audit: type=1326 audit(1713662161.871:20718): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.537598] FAT-fs (loop7): Unrecognized mount option "func=FIRMWARE_CHECK" or missing value [ 2992.539364] EXT4-fs (loop6): get root inode failed [ 2992.540340] EXT4-fs (loop6): mount failed [ 2992.542040] audit: type=1326 audit(1713662161.872:20719): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.547812] audit: type=1326 audit(1713662161.873:20720): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.553673] audit: type=1326 audit(1713662161.873:20721): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.558194] audit: type=1326 audit(1713662161.874:20722): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.561860] audit: type=1326 audit(1713662161.875:20723): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16112 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 2992.570868] EXT4-fs (loop0): get root inode failed [ 2992.571953] EXT4-fs (loop0): mount failed 01:16:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2992.676263] FAT-fs (loop7): Unrecognized mount option "func=FIRMWARE_CHECK" or missing value 01:16:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x7, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 2992.685203] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2992.685203] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2992.685203] 01:16:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x910b, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2992.729369] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2992.731356] EXT4-fs (loop5): group descriptors corrupted! 01:16:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:02 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockname(r0, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f00000001c0)=0x80) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x84400, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000280)={{r4}, 0xaeb, 0x0, 0xfffffffffffffffc}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 2992.783957] blktrace: Concurrent blktraces are not allowed on loop8 [ 2992.801022] blktrace: Concurrent blktraces are not allowed on loop8 01:16:02 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="012000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc888092c61bd6cc19bd10376b95fcd5f85227d97cbc2a29604d80db80af85d138b489ae42a9d4e380e19f82e40ea31a62d20d52ca9d9619d938b0c6d20f24cbe493f63658053533947546f1e5f29f8740cc7e21917ba271eb32440b87300caae8522a02c948221517de3a3719fd5834b46a402f10dec019fdbaef1bedefc1cf4d6519a265f779c20c04b7b3adeb1afc451a5d38f5cef2f272c688dc3dc2aabc2ead90bc325667132"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f00000000c0)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f000000b8c0)='ns/mnt\x00') r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x4000000) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendmmsg$unix(r2, &(0x7f000000ba40)=[{{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000100)="c4fa951c41", 0x5}, {&(0x7f0000000280)="4f201f12bc98cf8d931f70d6e33bb9", 0xf}], 0x3, &(0x7f0000001480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r3, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r2]}}], 0xb8, 0x1004}}, {{&(0x7f0000001540)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0), 0x0, &(0x7f0000006680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, r3, r2, r3, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r3, r2, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r3, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x160, 0x20000000}}, {{&(0x7f0000006800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006d00)=[{&(0x7f0000006880)="34193b4716e7f30ddd8011fb19f62a8623414679257b21183a", 0x19}, {&(0x7f00000068c0)="98a663a93ea4c00042b76d9e3a848d1b00361cb511604fc0f2674e5d162116c98fa3b349c602cf486b1b3a95e6c6d286b57198a093e9ff436204512f60ae6cf437d5245a3427f8c90a0f2889c51a744734bfe40a665ff58955cf19108b8b911ce94ab929bad0f00929cbcbacd2e0a3815c0078cf8f03621e0ddb1a7e8d650824365f28fb4a23877b09952fbd415d2f849de4d4c4701e6d7b55973d8a9ef7ba56e160c2845dc9c512bc1d9b8155c79f0eabd33452fe23f778a86ac85cc59a82074ae6e2e952c791b41d425c1e", 0xcc}, {&(0x7f00000069c0)="14c94c059d2ebc6c5be0bc51cfd4260e32f4c36228d8f6921cb9c4337070959161480140a9f025e8d0e9058849b9fc6bf97019837742fedb3bfe19243f727738112e693cad342de1ab15881b1042b1456143f549ec3c5d6881687e47bf5677c0e40337a5dc413be252df9dbeb6876a19a6169efd05713080a70252044bb1ef16cf279193e55a0aa7f5e7f471b5c4901a0a052a52b68452dedb511e7149eef600f5341892b5a805dbd78d491029d35fbd5cb6cb2fbefccdd39cf07cdaeee404948c56ae56e99803d03378abd10bf4a55581ab99ef16f71f6425deb6e758b9cc84c2fed34f27f9d67d44", 0xe9}, {&(0x7f0000006ac0)="66b76c078582b5c13e2b3d7b6b8d1818e51622eabb82bdcd6567490a51ef56b3af0773035004e9c26e350d26ded4386dd8a3c54796be4e52c8695bab9827b47c7d2a1127ad686a6cbdb7a08955a3472280b1ce1f7e15becd15bd867818a654442bcd865f1badfab631f664521e65c051ffe02ce47508e098bb1ec57a0fa530fe1d09ebd118f8be51d9f67d82f83ad3aa9b369866339c41242046b8a9a522236b3fd943bcaf768a3bd18a1a0beaac5592ac3a51ac1a4121e06416d412d142a07b886b04bf9099e76158b7784e46f3c8dff6efa5e573ce4f6cc3a7fc1036a142ab3a9c51f9cc627b088b1090cddb43a034972669ed", 0xf4}, {&(0x7f0000006bc0)="a45676eda8b9f4f8c773e34ae86d0db7fc0af7eae0a60fd253c6465aee6385fb8450418d5b8847a796a54a1f47201baab91889efc514e71f13f40d37f7a134d8ae328ca3897b7611c20ccf5e1c29f680d3b0912f6d68b6c235d145c920d3819dbc6ae1af1932bf6ca3e81a33d56964f8a81fdc4e3b965a0273fa3db69b2968b398e5ee63bf33dab6902526ef5ed839", 0x8f}, {&(0x7f0000006c80)="b1b1e134d4d9a06fb29b4d1a19396741fede4d6cfdc21c6498a192d74d20b8671e22f4a8bf4663ddb61255ea18b33870ff6bc52172c765d45d7fb3ef0f8a0e1cc27f567b4f8a5fd1ff2be8c3c73ec4a39499ca2de3b27e6660094bfc12cb55ddf327a31388a68d5d2ab320205df56063", 0x70}], 0x6, &(0x7f0000008a40)=[@rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x400c011}}, {{&(0x7f0000008a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000009100)=[{&(0x7f0000008b00)="2043cd32b71fa8951a3575ed973a9afc03723063162d02e5cfe52ed451892ae2c3c7460141f5bcd0a7462de13c8ffbab4da869bdd143e1811917ba20179104018e4db4ffc63ce83d37ec9b969ccdc537f3e566a0e76297ab99c7ea7da1a2330a6161904ad45bb41394f75dfdbb250b9a52eeadba2974da04e7f9241d5e19b535d016ebcc0b7785f49b78617d2f4bcb8eb05c32cca3ab0e19d8fda4e2e93466ddf350517186ebf832df7b6594f9aabc5ffad14d", 0xb3}, {&(0x7f0000008bc0)="2ed2f9519fb767b5834763716e472cb0d49e0c931d7403e5624de07d9cda51260a02e04ae6ff2efc884aff02bfb266e23b77c15cae707c90b8a42e535e9107977c9efa3cc4a139c500cb1e229b93a1adca5240efd8cefbb9f35d57085d01082083a03e3a12c4282d959d6ffeafe6ff3f96b57db4d392938463e172e9ee3560192e26d918f8dec37063d54bbc5a050aeb5d1ae95b16986e838fc71df2e555929e8908f59e0bbd8a458c0b9bd09b79f5d17b4ae309c65642c215fb6f36be10fec46b3f", 0xc2}, {&(0x7f0000008cc0)="dc54367496f924eed8a3ec3c18c88a8dbee88cfc67b43776f41807895149796b882042d3711b0e87e6edc40904793b935d689e031b33ec7992e4799f8b790824b95cf38122a1af3b3208de48ce3e9e62727ad4a6a3428b9772fed1e089578db2329f4fea83e35c287b86eff57c96316640236bbb4175079c226a091d606668ae9f39e3c3150faa2cb3b22294c346c7c3d315add5abf30b60e8e144360d2e289735e9a104cbae111363f05f47b5fe4ea3fa64531aa350ea6cf0", 0xb9}, {&(0x7f0000008d80)="c0d74ba7e8d426f0ab70a5d45cbb7e40bb594be45629cc59b32b153d354ec070e211093d9dcc5f37af0aea249d743a33a33e6b8ba3f82541907ecb34b2a7f8b64a2f11dd17df6da4d8c2b5380005ba941286", 0x52}, {&(0x7f0000008e00)="6b50e2c23e63e2bf1c846e563083aba450ec8d8ab568363d300045c03ee5100856e579c75682af6e49846fa2cb64b834ff9ca8657dc3364ded998c3483d606dfdf688dd4114e6a64a6e2e32fc863bcc18c300a76b92e58a3ea84c67b02b80ae17d6add9be01628cc269508cd793b134f748948af92c678230e633cfddbcbfca849f543bde65d72ed75e1f48d15e67f2b8898f4391d62528c98b6e342a14b9d9a1b4cefe4494aeb6589fa6227ffe54ed1f6ec9d19a5109dd3d32916141c85bc23788ccb1effcf37dcf4381c3af71dec1d1c2a9777d6c7a9dfe31913b1d2ead83857c0bc8eb868eb2dbdf8db72de512fb4d08dc2b18e2d", 0xf6}, {&(0x7f0000008f00)="3dae34fe02a4709c434f17c2b1ea981a34e06d2b7e2e5566cf252d7e9968edab799e58b1461b1928dfb4ab7d9bbec9dbb9093a5f49a39b4de3f11497f2fba53fc4ce52ab92bafbf71597189c3cd3341258d8afe43db35a1653fe87f9ff270d51e3faacba5521a44d8997bead302270ab74d60ff56d412b2351dcf9aa67fd15902f9982090c987cee78a57c9b0b585d9cadeeb505ff85599bca18e56d218f7acbbdb0332c7759f9002e3c37c4b5d5515e783f3ad0537d3ce906d0d34172c572547f77f8596625713cb12e1321423207dcf0897d7cca24f5073ba2dac92b82eafe88fb6302bbf101caf1d58b8236af8b2319", 0xf1}, {&(0x7f0000009000)="6a1fc2d95c8b6ba0cbcbdc8c04aed9c0814b9408ea31139cfb1ea0d244fd8580a5ea78978cefbfbd960da6165aef3ab90fd45722bf825143bcceb7ad1c5cb062eee4e878608fbe96a23833040f5d47a6eaec9bc08f7370e0cca5a29df60efd6489aa99699ced5aced43cd9eea76b5ffe76331fabf8163deadbbf4491c0392b2f66fa7291db144d27e46e5271f03414f5067698109d18337b59d54699ffd165e6c141981896de2240d15945f629e2728b0cdf64c1299f2a34d786365dafed7896e839e6290aa5f6651d58bfd624f441f3db35fba7c7a1b0ea69", 0xd9}], 0x7, &(0x7f0000009240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0xd8, 0x44800}}, {{0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009340)="2139a29490732fe943eb3a02d1413e085f1728253b532d2feafb6f9bf15b7ae89a683deac3f2214fa35cabde3e6ef3b8b058000f274d83c64f99ec5a5466b70544bcfdcb7b53c8", 0x47}], 0x1, &(0x7f0000009600)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @rights={{0x2c, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x140, 0x400c8d1}}, {{&(0x7f0000009740)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000009c80)=[{&(0x7f00000097c0)="fff8fe5327d04672e2a666bb4adb241690b9284da874ab3324ae16e75cc317321f96f38b8772782b60d8ee945864f93fac08952b13c932fd0eb94080aa301ef30d3d47f5a1ccee1630b7a0bb299aa80c33843c264ce0a23e561fd39a2fcf2cccdf1770f9c0a0085c0c7f6e24a6f2d68d6931f5afc44bffeef47976c907814c239093d951260669e9a10330d5dbc5bb47619604017637e290291d74fc42cf6476311d7191360decc9f548f57435b5dea1963ee5310aa23ecc7ca92a4f8856c55a8083951c54386f0b163aefffab77c2780085bab27dadf6a520ced1d7a1febe0405512f037c8876a5e126e6aa51e706a38b", 0xf1}, {&(0x7f00000098c0)="fe33f0f1673a6fc3e3469a0cc769e452733dad829358390ff9061d5933006d877f11e7c5087de4ea3952b18fc07276114f6e0bfa124c2ce9d2620908ecc3d44a57e1426defae03d7e0b062603b2a20224c99aa816497cfcddbc48ee56b5d6d4d343d975474d88a892797", 0x6a}, {&(0x7f0000009940)="ae7293730d72fa43148bf6d87f2b1b2bf5af19c748bf85bf53b0149a75abafe5a869e07305b20ca950de096a67155f95f524c41e406f4199df2ce86f50055760e790aff7e98365132e1517da2b3af832968e834da320aec03806c447a333e43bc8f35f1029c5743df7bbce3a43b3e6fff0c66a2a8b19b51a06192b3387241518e9171a6e77017d415e29d00de31c7b653d3d1b5f42f31d5e268cef30c0e7dbf887d8c9ace26843178406668c2cb2af1541d3772f46c1f02ba64d830bd85c6e6411", 0xc1}, {&(0x7f0000009a40)}, {&(0x7f0000009a80)="e10035810f2d990ccae0c28bb21ec72e90e9d66d117d4b1655b66704ffe4861e1295d57187a2117b3b415a6355041cbeb3343d6d9af0b68ddd6ab1941d7bb079fbda94d5654caec6c9eafb1b081f4196a859fbe7baefb24bb21f81368b4074205eade8087993b457b87bd47caaa502c0c5e9d08839895b239ddceac6910c57a0f93a9a5582175d39db9d0ddd909928d985e6c844e706f81a0fa28f4f2456ff2c2e2f5dadb71e319d163077b8ab1018b9edb3c0c24f86664379d942ed719374bbb84bdbf5f1eece86ac1dea8e5251082a9ab55b6ba0725a4d98d7ce74294b0ce965539bc1a50e627e19deb8e36ceb", 0xee}, {&(0x7f0000009b80)="42d48ebc52873332aa5d28af9f51d72b1ba6f9fbcd505cf41fc3568a884e16bdb3d7d77fcd329f5ef9e43f1329c3a955769427541820d6d014216538f0d5ed588259b9b721aed9e41f93cea10287af16ed443773b74ae98e4bf130a60541b9f7dfc5ce2717dc6e3940fb4b89131953e2d442cd4ac4f79e0f8669d818cead64ce6284c9b8dcf4f082d99d21165427675795b6ac4dc76ec7810a2a1f032961cb7984c3c2edb8271ee74e3081eb02946bee11dda0c41222230fbebb5797e3dbbf7fde44f82262cd16457f11eabd5d1cc10accbc2b2a64e6fb399e9e612de0d50e9ae4334a45f6452f6d3ccce178", 0xec}], 0x6, &(0x7f0000009d00)=[@cred={{0x1c}}], 0x20, 0x2400c800}}, {{&(0x7f0000009d40)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f000000af40)=[{&(0x7f0000009dc0)="26a59cb63c2f53a8dddc1d3c29402bf69738c21e7a3b17deec57aba10882c7ec3e40", 0x22}, {&(0x7f0000009e00)="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", 0x1000}, {&(0x7f000000ae00)="9c9ac9305122d62ca6d7bdf27f6d03ed678eeeb105c88e9e31fbc290a1065186d8dc11db89d8371805258951dc274769eac80790290a53dbe539f0223f60dd57edbffff0f9c73beb", 0x48}, {&(0x7f000000ae80)="b5da532162d951a47cacf731987cbe00a4503a84b221fab802721460cad0be9c7a4e116a53888a8b1d97ed681cdc13907fbf459c4b952414a98599b448c91cb71a3b190f93d7b32c9959fcc8d45254c685032beacfba5224d9401744ffb0191d62e3e36d184a6d705b58921a4995c83bd6362dfca4a2f69e3cb64a1f81eab121ef1078881e2d", 0x86}], 0x4, &(0x7f000000b080)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, r0, r2]}}], 0x80, 0x10}}, {{&(0x7f000000b100)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f000000b500)=[{&(0x7f000000b180)="9ada6c1dac077ef7c93f9afff132a31f1710a154f9a2dc735cc88c7bd27abf6520cf3088ebba3e7fa58159751e66b2e8cf261f4cdbd186219e80c9c3497b495bb1bb7eb4a52bbcf2a0c014b005ce600b43fb5952cfe693544169d76bce2eafb55df826f993424df770c1d0ceee0d7c01", 0x70}, {&(0x7f000000b200)="c1b0035cb1e301d927e8932e8e701aae03296e3fe019e669c22b57a2107054673653bc9db05dc537", 0x28}, {&(0x7f000000b240)="f63bd21ab0c0f9631b1c50887f426d5ded2301a657bdb20d1856c3a6efdb5c2f291ec0bb4c4e03773ef92f66dc4e6212f95b16a9b2ad723997b01d945804ace536fa48a6228a00cb801ed280c939b0c72d905b03f343", 0x56}, {&(0x7f000000b2c0)="bf63f6f0bd4c56698f46ba51056954927d90eb68a2d55d102d5f6a72079ecd54067d2d0fe074b40b778f0e3217cbd09532e73ee1b337fa4c5af5614bc7002518ea94604b3cfad2b6ad213c78d11f97bfdbe432b746bf69bfe5b4cd55bd858a856f86dd0fbd31baeddce4b450efc167f03b43b8138578bfb44b65692a9a83eb303cdf95d5ebfc1a65eaa2bd855ea3f0e55caac98be93062c6f00e1ff88765ddcc902e00368c4adf4767e04707526b1f85c4a016e15134a18121", 0xb9}, {&(0x7f000000b380)="e3928d701e3ec8b4ff7057e55d3e0bf1331c2751168b921a91a91100376820f9c97ca7a5027e27849081211bbeac57f6156f1a0943ca7ffa4fbe86982b1ca236b9d1a0169ddaea754b9a6a6093c4c1566aab4dced79d0b1c91fa5d502bb67ad752a0c473f2b251edf0fb3f39f3d9a9e01c16acbb004cc347a2de2bf38feb41d7d2a3409ff13bea5fb007adc273cf2a5f5ad4ed4eda3e6b0bea2ee395cd24db18", 0xa0}, {&(0x7f000000b440)="518ffc7ef4953bd4da5ac020ea02c503814eae21dd01efd5da05ed85094a929ddb4d03d033e5003825d51a96f11555c26bd6bd390af452af023510c10a6030291183dc738cd56579bd78ac8dd49db322d06d5043b03c5babea8b633a9ad638ff74c72e7782b07fe457df1a223f3425df85e0df0e96a30dec5984bb67cca23678d8341864b90324d89f715117242338bb88bee9", 0x93}], 0x6, &(0x7f000000b900)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r4, r0, r5, r2, 0xffffffffffffffff, r0, r3, r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r6, r3, r3]}}], 0x120, 0x44000}}], 0x8, 0x80) openat(r2, &(0x7f0000000080)='./file0\x00', 0x214600, 0x30) 01:16:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:02 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0xd8948, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) [ 2992.893344] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2992.893344] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2992.893344] 01:16:02 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xe003, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 2992.925937] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2992.928320] EXT4-fs (loop0): get root inode failed [ 2992.929235] EXT4-fs (loop0): mount failed 01:16:02 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0xfffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x200, 0x93) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000240)={@local, 0x5c}) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x9, 0x4, 0xc3, 0x81, 0x0, 0x6, 0x140b1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24, 0x1, @perf_config_ext={0x9, 0x7}, 0x4000, 0x6, 0x7fffffff, 0x1, 0x9c, 0x20, 0xdb, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x8, r2, 0x3) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100e07718000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:16:02 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2993.011026] blktrace: Concurrent blktraces are not allowed on loop4 01:16:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 2993.054035] blktrace: Concurrent blktraces are not allowed on loop8 [ 2993.056139] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 2993.056139] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2993.056139] [ 2993.067145] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 2993.068923] EXT4-fs (loop5): group descriptors corrupted! 01:16:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0xfd, 0x0, 0x5e, 0x20000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x8, 0x1004, 0x0, 0x9, 0x0, 0x10, 0x0, 0x40}, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 2993.100118] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 2993.100118] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2993.100118] [ 2993.105106] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 2993.107158] EXT4-fs (loop6): get root inode failed [ 2993.108006] EXT4-fs (loop6): mount failed [ 2993.117779] blktrace: Concurrent blktraces are not allowed on loop8 [ 2993.168649] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 2993.168649] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 2993.168649] [ 2993.203530] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 2993.211121] EXT4-fs (loop0): get root inode failed [ 2993.212028] EXT4-fs (loop0): mount failed 01:16:15 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x7f, 0x4, 0xc9, 0x0, 0x5, 0x101, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x4, 0xe0fa}, 0x2020, 0x9, 0x9, 0x4, 0x5, 0x2, 0x0, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x8, r0, 0x2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x5, @local, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@empty, 0x75, r6}) 01:16:15 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) recvmmsg$unix(r5, &(0x7f0000000440)=[{{&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1, &(0x7f0000000340)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}], 0x1, 0x40002100, &(0x7f0000000480)) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x220030, &(0x7f0000000540)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, 'lo\x00'}}], [{@fowner_lt={'fowner<', r6}}, {@obj_role={'obj_role', 0x3d, 'lo\x00'}}, {@appraise}, {@uid_lt}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:16:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:15 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:15 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3006.489628] kauditd_printk_skb: 80 callbacks suppressed [ 3006.489648] audit: type=1326 audit(1713662175.896:20804): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16187 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3006.492675] audit: type=1326 audit(1713662175.899:20805): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16187 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3006.498618] audit: type=1326 audit(1713662175.904:20806): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16190 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:16:15 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xe501, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:16:15 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x8000, 0x82) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000009c0)=ANY=[@ANYBLOB="010000009408000018000000ed7b806a3dc15c45e82530de203fbb000000000000008d1cc3558df7fc36ef913ae6469d374df90180353ca76b9037aa73018312cdbc4e8b5c0cd6a5ddaf6ef45a9d1543ac8b06202e0a9f36c353578c1956e2bef164c4c33e98489683730fba994799bb7fe47d2ca1c00b4367a08fb7c2f096f17a44d5c2a9826ccdb982b564c22df508b2ce0c5a7b14abb9b5d5fecb6c679bdabe26e958423d63c4187431c613d99b7a67798a59bec3", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) r6 = openat(r3, &(0x7f0000000740)='./file0\x00', 0x80, 0x2d) r7 = openat$cgroup_freezer_state(r3, &(0x7f00000007c0), 0x2, 0x0) r8 = inotify_init1(0x0) inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r8, &(0x7f0000000180)='./file0\x00', 0x4000000) io_submit(0x0, 0x8, &(0x7f0000000980)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)="8b0e3ecd4830a0db0394b08006654d66ca4cb409a47451408c4a647eb3b67e5b0917b775686dd50fb2cebd39ec1b8a06af34681a0bf2478d2b", 0x39, 0x40}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x100, r0, &(0x7f0000000180)="3f5a69dcfd4fdfe5daf71a7fa70582f30b4a", 0x12, 0x88, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, &(0x7f00000002c0)="606cda339012c90530533bb9ad114f4f2e74062bb118ce8fc60b628fbd6cd048edeb1153b5435f7274a13729df4a4a3dd530e4df751ee61f6a04da7d3da9cbca6670722edd5416d801ce9ae45b34eeb38a55e40148b6763ccf099e73e51e3319feb887abfca2d562a148b1bfca4d81b2aa1cc7d534ff90141976ffaa2946a40b92079105fd1e7630de54c140", 0x8c, 0x9}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x8, 0x3896, 0xffffffffffffffff, &(0x7f0000000440)="1d71f1c04aa380f8c0d2cb7092c04b256811e40430f34b7ef3dbf2694b195d6a3fded351cb8373b17fd24bca914111447ebc201d66af44c60b81ead0aa8de3197c8ec8cb1001b9ef12a4aaab51a92aa7ab489c121145e9f441d964ecea3ab3e5c2fc5f48586ab25219ad5f994d52cab8874204555881b8f3241646fcfc5a4b7599cc72a9c95f557542fb9f27bf64eb5f1925379c85f843efea2f06a80103d2f65a0ddc1ff6a5", 0xa6, 0xd8, 0x0, 0x1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0xfffb, r1, &(0x7f0000000540)="5c981695076e6c52157535deaa269b24bd67839b3231acbff2556b2c5d8f66c34b63c637d1d61a770a5f529254c05d5d4bafcf506e59b17c6f22a02664d4e23bcf2c5ac721d8dfcd7777ad007e4d0badc9825db98a58262f1fc2fad8a7289164e2014a0bdb1218398cff90504ab85db2b590c419d78cbc647434f74978abc02c891b7713e0cff7f945e820d5eeb617dfdf50ff4275362af5d90f90aa98036b7b48894a95535e7115383fc8740e99", 0xae}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x43c, 0xffffffffffffffff, &(0x7f0000000700)="5535e953f2ae91a58ba770fa", 0xc, 0x4, 0x0, 0x0, r6}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3, 0x60e, r7, &(0x7f0000000800)="11b247d6eeb85c4d464d1cf874099cd830644b55c7500f07fb577a76625f5e6ed6a52fabb065c1a56d16bdb7b1542e0aad4a294c5bad360b97d760e46cf4ca14e83e8178ae8388f7e500ea45c4dbfcc85701303c498fdd16c702ae688a8e63f66294ac8d8c0806b671c5205afe4b495ede435314a1976b9ae00381986d20effaf18d9fce5f4fe3e7c14e165bde149cc0990adb7819e3358a1449ab6d2ccce2dc0a", 0xa1, 0x2, 0x0, 0x0, r5}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x4, r8, &(0x7f0000000900)="82b50171f6930d6f680e2c51bc93145eb3026ad45566073f21622ad275da5c3496df147752e5b99600b17875b032b4cc09f6168d2348efa339", 0x39, 0x5, 0x0, 0x3}]) [ 3006.502567] audit: type=1326 audit(1713662175.904:20807): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16190 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3006.511589] audit: type=1326 audit(1713662175.905:20808): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16190 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3006.516583] audit: type=1326 audit(1713662175.905:20809): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16187 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3006.534221] audit: type=1326 audit(1713662175.905:20810): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16190 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3006.538897] blktrace: Concurrent blktraces are not allowed on loop8 [ 3006.543039] audit: type=1326 audit(1713662175.905:20811): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16187 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3006.554286] blktrace: Concurrent blktraces are not allowed on loop4 [ 3006.558298] audit: type=1326 audit(1713662175.905:20812): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16190 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3006.558618] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3006.558618] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3006.558618] [ 3006.564707] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3006.564707] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3006.564707] [ 3006.570858] audit: type=1326 audit(1713662175.905:20813): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16187 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3006.581846] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3006.583419] EXT4-fs (loop0): group descriptors corrupted! [ 3006.584304] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3006.584304] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3006.584304] [ 3006.588633] blktrace: Concurrent blktraces are not allowed on loop8 [ 3006.599662] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3006.602147] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3006.602345] EXT4-fs (loop6): get root inode failed [ 3006.603142] EXT4-fs (loop5): group descriptors corrupted! [ 3006.603876] EXT4-fs (loop6): mount failed 01:16:16 executing program 3: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) getdents64(r0, &(0x7f0000000240)=""/179, 0xb3) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x3, r5}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:16:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000180000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:16:32 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xe902, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:16:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:32 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3023.111947] blktrace: Concurrent blktraces are not allowed on loop8 01:16:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:16:32 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3023.119507] kauditd_printk_skb: 76 callbacks suppressed [ 3023.119525] audit: type=1326 audit(1713662192.526:20890): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.125593] audit: type=1326 audit(1713662192.527:20891): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.129062] audit: type=1326 audit(1713662192.527:20892): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.132551] blktrace: Concurrent blktraces are not allowed on loop8 [ 3023.147757] blktrace: Concurrent blktraces are not allowed on loop4 [ 3023.160637] audit: type=1326 audit(1713662192.527:20893): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.179923] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3023.179923] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.179923] [ 3023.180151] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3023.180151] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.180151] [ 3023.193589] audit: type=1326 audit(1713662192.536:20894): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.196082] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3023.199747] EXT4-fs (loop6): get root inode failed [ 3023.200562] EXT4-fs (loop6): mount failed [ 3023.200776] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3023.202652] EXT4-fs (loop0): group descriptors corrupted! [ 3023.209256] audit: type=1326 audit(1713662192.536:20895): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.223604] audit: type=1326 audit(1713662192.536:20896): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 01:16:32 executing program 4: fallocate(0xffffffffffffffff, 0x0, 0x3, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000280)={0x200, 0x8, 0x2, 0xd8e, 0x6, [{0xcd, 0x6, 0x3, '\x00', 0x298a}, {0x1ffc00, 0x6, 0x4, '\x00', 0x2109}, {0x401, 0x1000, 0x71936977, '\x00', 0x1908}, {0x7ff, 0x4, 0x7f, '\x00', 0x8}, {0x8, 0x3, 0x3, '\x00', 0x2001}, {0x400, 0x8, 0x1ff, '\x00', 0x40e}]}) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r2, &(0x7f0000000180)='./file0\x00', 0x4000000) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x4000000) r4 = eventfd2(0x6a2a05e8, 0x1) ppoll(&(0x7f0000000080)=[{r1, 0x2400}, {r2}, {r3, 0x4}, {0xffffffffffffffff, 0x40}, {r4, 0x1}], 0x5, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={[0xfb]}, 0x8) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendto(0xffffffffffffffff, &(0x7f0000000440)="e314984f33505d3af820be12a6279ab435c80ee583a8e268669cd3e14dea261f63d69c3c42e66be6bdb3c1aa2320e8889f54d2bb9eb5aafae87bad1a5451f52c80fe01ed0596f90a8ed71b598fa211bf220a445acb21de539d57e6f0a916eb0fa74c47d59db2bbfff6dd6cbc54522a2030bb033e2f724237c9cc82bafec7c80bd067881f63082d1df5c21c0d853322ea91f4139f51d26c9ce01aab342e228c5bbd78b2c078e77649ca72d89d8892f26c2cc54f8595e21c0d6cb934abb97cb98446f6d7339d53037f6c66fca88dd16a", 0xcf, 0x40, &(0x7f0000000540)=@caif=@util={0x25, "e53fbe415b613ce2b13527a81b36a046"}, 0x80) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 3023.240311] audit: type=1326 audit(1713662192.536:20897): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.252596] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3023.252596] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.252596] [ 3023.254527] audit: type=1326 audit(1713662192.541:20898): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 01:16:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/254, 0xfe) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) umount2(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 3023.270991] audit: type=1326 audit(1713662192.541:20899): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16224 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3023.278762] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3023.280210] EXT4-fs (loop3): group descriptors corrupted! 01:16:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xec03, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:16:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3023.327465] blktrace: Concurrent blktraces are not allowed on loop8 01:16:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3023.353809] blktrace: Concurrent blktraces are not allowed on loop4 [ 3023.364043] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3023.364043] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.364043] [ 3023.368851] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3023.370756] EXT4-fs (loop5): group descriptors corrupted! 01:16:32 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x88000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="012000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc888092c61bd6cc19bd10376b95fcd5f85227d97cbc2a29604d80db80af85d138b489ae42a9d4e380e19f82e40ea31a62d20d52ca9d9619d938b0c6d20f24cbe493f63658053533947546f1e5f29f8740cc7e21917ba271eb32440b87300caae8522a02c948221517de3a3719fd5834b46a402f10dec019fdbaef1bedefc1cf4d6519a265f779c20c04b7b3adeb1afc451a5d38f5cef2f272c688dc3dc2aabc2ead90bc325667132"]) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x4000000) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f00000000c0)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f000000b8c0)='ns/mnt\x00') r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x4000000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x4000000) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendmmsg$unix(r2, &(0x7f000000ba40)=[{{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000100)="c4fa951c41", 0x5}, {&(0x7f0000000280)="4f201f12bc98cf8d931f70d6e33bb9", 0xf}], 0x3, &(0x7f0000001480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r3, r2, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, r2]}}], 0xb8, 0x1004}}, {{&(0x7f0000001540)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000015c0), 0x0, &(0x7f0000006680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff, r3, r2, r3, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r3, r2, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r1, r3, r3, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x160, 0x20000000}}, {{&(0x7f0000006800)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006d00)=[{&(0x7f0000006880)="34193b4716e7f30ddd8011fb19f62a8623414679257b21183a", 0x19}, {&(0x7f00000068c0)="98a663a93ea4c00042b76d9e3a848d1b00361cb511604fc0f2674e5d162116c98fa3b349c602cf486b1b3a95e6c6d286b57198a093e9ff436204512f60ae6cf437d5245a3427f8c90a0f2889c51a744734bfe40a665ff58955cf19108b8b911ce94ab929bad0f00929cbcbacd2e0a3815c0078cf8f03621e0ddb1a7e8d650824365f28fb4a23877b09952fbd415d2f849de4d4c4701e6d7b55973d8a9ef7ba56e160c2845dc9c512bc1d9b8155c79f0eabd33452fe23f778a86ac85cc59a82074ae6e2e952c791b41d425c1e", 0xcc}, {&(0x7f00000069c0)="14c94c059d2ebc6c5be0bc51cfd4260e32f4c36228d8f6921cb9c4337070959161480140a9f025e8d0e9058849b9fc6bf97019837742fedb3bfe19243f727738112e693cad342de1ab15881b1042b1456143f549ec3c5d6881687e47bf5677c0e40337a5dc413be252df9dbeb6876a19a6169efd05713080a70252044bb1ef16cf279193e55a0aa7f5e7f471b5c4901a0a052a52b68452dedb511e7149eef600f5341892b5a805dbd78d491029d35fbd5cb6cb2fbefccdd39cf07cdaeee404948c56ae56e99803d03378abd10bf4a55581ab99ef16f71f6425deb6e758b9cc84c2fed34f27f9d67d44", 0xe9}, {&(0x7f0000006ac0)="66b76c078582b5c13e2b3d7b6b8d1818e51622eabb82bdcd6567490a51ef56b3af0773035004e9c26e350d26ded4386dd8a3c54796be4e52c8695bab9827b47c7d2a1127ad686a6cbdb7a08955a3472280b1ce1f7e15becd15bd867818a654442bcd865f1badfab631f664521e65c051ffe02ce47508e098bb1ec57a0fa530fe1d09ebd118f8be51d9f67d82f83ad3aa9b369866339c41242046b8a9a522236b3fd943bcaf768a3bd18a1a0beaac5592ac3a51ac1a4121e06416d412d142a07b886b04bf9099e76158b7784e46f3c8dff6efa5e573ce4f6cc3a7fc1036a142ab3a9c51f9cc627b088b1090cddb43a034972669ed", 0xf4}, {&(0x7f0000006bc0)="a45676eda8b9f4f8c773e34ae86d0db7fc0af7eae0a60fd253c6465aee6385fb8450418d5b8847a796a54a1f47201baab91889efc514e71f13f40d37f7a134d8ae328ca3897b7611c20ccf5e1c29f680d3b0912f6d68b6c235d145c920d3819dbc6ae1af1932bf6ca3e81a33d56964f8a81fdc4e3b965a0273fa3db69b2968b398e5ee63bf33dab6902526ef5ed839", 0x8f}, {&(0x7f0000006c80)="b1b1e134d4d9a06fb29b4d1a19396741fede4d6cfdc21c6498a192d74d20b8671e22f4a8bf4663ddb61255ea18b33870ff6bc52172c765d45d7fb3ef0f8a0e1cc27f567b4f8a5fd1ff2be8c3c73ec4a39499ca2de3b27e6660094bfc12cb55ddf327a31388a68d5d2ab320205df56063", 0x70}], 0x6, &(0x7f0000008a40)=[@rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0x40, 0x400c011}}, {{&(0x7f0000008a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000009100)=[{&(0x7f0000008b00)="2043cd32b71fa8951a3575ed973a9afc03723063162d02e5cfe52ed451892ae2c3c7460141f5bcd0a7462de13c8ffbab4da869bdd143e1811917ba20179104018e4db4ffc63ce83d37ec9b969ccdc537f3e566a0e76297ab99c7ea7da1a2330a6161904ad45bb41394f75dfdbb250b9a52eeadba2974da04e7f9241d5e19b535d016ebcc0b7785f49b78617d2f4bcb8eb05c32cca3ab0e19d8fda4e2e93466ddf350517186ebf832df7b6594f9aabc5ffad14d", 0xb3}, {&(0x7f0000008bc0)="2ed2f9519fb767b5834763716e472cb0d49e0c931d7403e5624de07d9cda51260a02e04ae6ff2efc884aff02bfb266e23b77c15cae707c90b8a42e535e9107977c9efa3cc4a139c500cb1e229b93a1adca5240efd8cefbb9f35d57085d01082083a03e3a12c4282d959d6ffeafe6ff3f96b57db4d392938463e172e9ee3560192e26d918f8dec37063d54bbc5a050aeb5d1ae95b16986e838fc71df2e555929e8908f59e0bbd8a458c0b9bd09b79f5d17b4ae309c65642c215fb6f36be10fec46b3f", 0xc2}, {&(0x7f0000008cc0)="dc54367496f924eed8a3ec3c18c88a8dbee88cfc67b43776f41807895149796b882042d3711b0e87e6edc40904793b935d689e031b33ec7992e4799f8b790824b95cf38122a1af3b3208de48ce3e9e62727ad4a6a3428b9772fed1e089578db2329f4fea83e35c287b86eff57c96316640236bbb4175079c226a091d606668ae9f39e3c3150faa2cb3b22294c346c7c3d315add5abf30b60e8e144360d2e289735e9a104cbae111363f05f47b5fe4ea3fa64531aa350ea6cf0", 0xb9}, {&(0x7f0000008d80)="c0d74ba7e8d426f0ab70a5d45cbb7e40bb594be45629cc59b32b153d354ec070e211093d9dcc5f37af0aea249d743a33a33e6b8ba3f82541907ecb34b2a7f8b64a2f11dd17df6da4d8c2b5380005ba941286", 0x52}, {&(0x7f0000008e00)="6b50e2c23e63e2bf1c846e563083aba450ec8d8ab568363d300045c03ee5100856e579c75682af6e49846fa2cb64b834ff9ca8657dc3364ded998c3483d606dfdf688dd4114e6a64a6e2e32fc863bcc18c300a76b92e58a3ea84c67b02b80ae17d6add9be01628cc269508cd793b134f748948af92c678230e633cfddbcbfca849f543bde65d72ed75e1f48d15e67f2b8898f4391d62528c98b6e342a14b9d9a1b4cefe4494aeb6589fa6227ffe54ed1f6ec9d19a5109dd3d32916141c85bc23788ccb1effcf37dcf4381c3af71dec1d1c2a9777d6c7a9dfe31913b1d2ead83857c0bc8eb868eb2dbdf8db72de512fb4d08dc2b18e2d", 0xf6}, {&(0x7f0000008f00)="3dae34fe02a4709c434f17c2b1ea981a34e06d2b7e2e5566cf252d7e9968edab799e58b1461b1928dfb4ab7d9bbec9dbb9093a5f49a39b4de3f11497f2fba53fc4ce52ab92bafbf71597189c3cd3341258d8afe43db35a1653fe87f9ff270d51e3faacba5521a44d8997bead302270ab74d60ff56d412b2351dcf9aa67fd15902f9982090c987cee78a57c9b0b585d9cadeeb505ff85599bca18e56d218f7acbbdb0332c7759f9002e3c37c4b5d5515e783f3ad0537d3ce906d0d34172c572547f77f8596625713cb12e1321423207dcf0897d7cca24f5073ba2dac92b82eafe88fb6302bbf101caf1d58b8236af8b2319", 0xf1}, {&(0x7f0000009000)="6a1fc2d95c8b6ba0cbcbdc8c04aed9c0814b9408ea31139cfb1ea0d244fd8580a5ea78978cefbfbd960da6165aef3ab90fd45722bf825143bcceb7ad1c5cb062eee4e878608fbe96a23833040f5d47a6eaec9bc08f7370e0cca5a29df60efd6489aa99699ced5aced43cd9eea76b5ffe76331fabf8163deadbbf4491c0392b2f66fa7291db144d27e46e5271f03414f5067698109d18337b59d54699ffd165e6c141981896de2240d15945f629e2728b0cdf64c1299f2a34d786365dafed7896e839e6290aa5f6651d58bfd624f441f3db35fba7c7a1b0ea69", 0xd9}], 0x7, &(0x7f0000009240)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0xd8, 0x44800}}, {{0x0, 0x0, &(0x7f00000093c0)=[{&(0x7f0000009340)="2139a29490732fe943eb3a02d1413e085f1728253b532d2feafb6f9bf15b7ae89a683deac3f2214fa35cabde3e6ef3b8b058000f274d83c64f99ec5a5466b70544bcfdcb7b53c8", 0x47}], 0x1, &(0x7f0000009600)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @rights={{0x2c, 0x1, 0x1, [r2, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff]}}], 0x140, 0x400c8d1}}, {{&(0x7f0000009740)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000009c80)=[{&(0x7f00000097c0)="fff8fe5327d04672e2a666bb4adb241690b9284da874ab3324ae16e75cc317321f96f38b8772782b60d8ee945864f93fac08952b13c932fd0eb94080aa301ef30d3d47f5a1ccee1630b7a0bb299aa80c33843c264ce0a23e561fd39a2fcf2cccdf1770f9c0a0085c0c7f6e24a6f2d68d6931f5afc44bffeef47976c907814c239093d951260669e9a10330d5dbc5bb47619604017637e290291d74fc42cf6476311d7191360decc9f548f57435b5dea1963ee5310aa23ecc7ca92a4f8856c55a8083951c54386f0b163aefffab77c2780085bab27dadf6a520ced1d7a1febe0405512f037c8876a5e126e6aa51e706a38b", 0xf1}, {&(0x7f00000098c0)="fe33f0f1673a6fc3e3469a0cc769e452733dad829358390ff9061d5933006d877f11e7c5087de4ea3952b18fc07276114f6e0bfa124c2ce9d2620908ecc3d44a57e1426defae03d7e0b062603b2a20224c99aa816497cfcddbc48ee56b5d6d4d343d975474d88a892797", 0x6a}, {&(0x7f0000009940)="ae7293730d72fa43148bf6d87f2b1b2bf5af19c748bf85bf53b0149a75abafe5a869e07305b20ca950de096a67155f95f524c41e406f4199df2ce86f50055760e790aff7e98365132e1517da2b3af832968e834da320aec03806c447a333e43bc8f35f1029c5743df7bbce3a43b3e6fff0c66a2a8b19b51a06192b3387241518e9171a6e77017d415e29d00de31c7b653d3d1b5f42f31d5e268cef30c0e7dbf887d8c9ace26843178406668c2cb2af1541d3772f46c1f02ba64d830bd85c6e6411", 0xc1}, {&(0x7f0000009a40)}, {&(0x7f0000009a80)="e10035810f2d990ccae0c28bb21ec72e90e9d66d117d4b1655b66704ffe4861e1295d57187a2117b3b415a6355041cbeb3343d6d9af0b68ddd6ab1941d7bb079fbda94d5654caec6c9eafb1b081f4196a859fbe7baefb24bb21f81368b4074205eade8087993b457b87bd47caaa502c0c5e9d08839895b239ddceac6910c57a0f93a9a5582175d39db9d0ddd909928d985e6c844e706f81a0fa28f4f2456ff2c2e2f5dadb71e319d163077b8ab1018b9edb3c0c24f86664379d942ed719374bbb84bdbf5f1eece86ac1dea8e5251082a9ab55b6ba0725a4d98d7ce74294b0ce965539bc1a50e627e19deb8e36ceb", 0xee}, {&(0x7f0000009b80)="42d48ebc52873332aa5d28af9f51d72b1ba6f9fbcd505cf41fc3568a884e16bdb3d7d77fcd329f5ef9e43f1329c3a955769427541820d6d014216538f0d5ed588259b9b721aed9e41f93cea10287af16ed443773b74ae98e4bf130a60541b9f7dfc5ce2717dc6e3940fb4b89131953e2d442cd4ac4f79e0f8669d818cead64ce6284c9b8dcf4f082d99d21165427675795b6ac4dc76ec7810a2a1f032961cb7984c3c2edb8271ee74e3081eb02946bee11dda0c41222230fbebb5797e3dbbf7fde44f82262cd16457f11eabd5d1cc10accbc2b2a64e6fb399e9e612de0d50e9ae4334a45f6452f6d3ccce178", 0xec}], 0x6, &(0x7f0000009d00)=[@cred={{0x1c}}], 0x20, 0x2400c800}}, {{&(0x7f0000009d40)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f000000af40)=[{&(0x7f0000009dc0)="26a59cb63c2f53a8dddc1d3c29402bf69738c21e7a3b17deec57aba10882c7ec3e40", 0x22}, {&(0x7f0000009e00)="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", 0x1000}, {&(0x7f000000ae00)="9c9ac9305122d62ca6d7bdf27f6d03ed678eeeb105c88e9e31fbc290a1065186d8dc11db89d8371805258951dc274769eac80790290a53dbe539f0223f60dd57edbffff0f9c73beb", 0x48}, {&(0x7f000000ae80)="b5da532162d951a47cacf731987cbe00a4503a84b221fab802721460cad0be9c7a4e116a53888a8b1d97ed681cdc13907fbf459c4b952414a98599b448c91cb71a3b190f93d7b32c9959fcc8d45254c685032beacfba5224d9401744ffb0191d62e3e36d184a6d705b58921a4995c83bd6362dfca4a2f69e3cb64a1f81eab121ef1078881e2d", 0x86}], 0x4, &(0x7f000000b080)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, r0, r2]}}], 0x80, 0x10}}, {{&(0x7f000000b100)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f000000b500)=[{&(0x7f000000b180)="9ada6c1dac077ef7c93f9afff132a31f1710a154f9a2dc735cc88c7bd27abf6520cf3088ebba3e7fa58159751e66b2e8cf261f4cdbd186219e80c9c3497b495bb1bb7eb4a52bbcf2a0c014b005ce600b43fb5952cfe693544169d76bce2eafb55df826f993424df770c1d0ceee0d7c01", 0x70}, {&(0x7f000000b200)="c1b0035cb1e301d927e8932e8e701aae03296e3fe019e669c22b57a2107054673653bc9db05dc537", 0x28}, {&(0x7f000000b240)="f63bd21ab0c0f9631b1c50887f426d5ded2301a657bdb20d1856c3a6efdb5c2f291ec0bb4c4e03773ef92f66dc4e6212f95b16a9b2ad723997b01d945804ace536fa48a6228a00cb801ed280c939b0c72d905b03f343", 0x56}, {&(0x7f000000b2c0)="bf63f6f0bd4c56698f46ba51056954927d90eb68a2d55d102d5f6a72079ecd54067d2d0fe074b40b778f0e3217cbd09532e73ee1b337fa4c5af5614bc7002518ea94604b3cfad2b6ad213c78d11f97bfdbe432b746bf69bfe5b4cd55bd858a856f86dd0fbd31baeddce4b450efc167f03b43b8138578bfb44b65692a9a83eb303cdf95d5ebfc1a65eaa2bd855ea3f0e55caac98be93062c6f00e1ff88765ddcc902e00368c4adf4767e04707526b1f85c4a016e15134a18121", 0xb9}, {&(0x7f000000b380)="e3928d701e3ec8b4ff7057e55d3e0bf1331c2751168b921a91a91100376820f9c97ca7a5027e27849081211bbeac57f6156f1a0943ca7ffa4fbe86982b1ca236b9d1a0169ddaea754b9a6a6093c4c1566aab4dced79d0b1c91fa5d502bb67ad752a0c473f2b251edf0fb3f39f3d9a9e01c16acbb004cc347a2de2bf38feb41d7d2a3409ff13bea5fb007adc273cf2a5f5ad4ed4eda3e6b0bea2ee395cd24db18", 0xa0}, {&(0x7f000000b440)="518ffc7ef4953bd4da5ac020ea02c503814eae21dd01efd5da05ed85094a929ddb4d03d033e5003825d51a96f11555c26bd6bd390af452af023510c10a6030291183dc738cd56579bd78ac8dd49db322d06d5043b03c5babea8b633a9ad638ff74c72e7782b07fe457df1a223f3425df85e0df0e96a30dec5984bb67cca23678d8341864b90324d89f715117242338bb88bee9", 0x93}], 0x6, &(0x7f000000b900)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x38, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r4, r0, r5, r2, 0xffffffffffffffff, r0, r3, r0, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r6, r3, r3]}}], 0x120, 0x44000}}], 0x8, 0x80) openat(r2, &(0x7f0000000080)='./file0\x00', 0x214600, 0x30) [ 3023.416328] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3023.416328] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.416328] [ 3023.442408] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3023.442408] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.442408] [ 3023.447832] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3023.451353] EXT4-fs (loop6): get root inode failed [ 3023.452231] EXT4-fs (loop6): mount failed [ 3023.454251] blktrace: Concurrent blktraces are not allowed on loop2 [ 3023.462446] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3023.463755] EXT4-fs (loop0): group descriptors corrupted! 01:16:32 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:32 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000280)={{0x6, 0x6}, 0x100, './file0\x00'}) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:16:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:32 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:32 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0), 0x100) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0xdcc3, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000280)="553c3a03b00f3766b778f54de9c221861fb2623418031c739a47af96c1e822f5484bc273fcae920ddf0fb7eedefc326588ff7c3310e9973163f912455083e43c44e32712ae8334ff33412f0e7726752a510a728bb3181830061f060c190ec3417ee6d0bce17f944d01976c0bf23dd4b20bd8432a0a071551d9339f47300321c15706a7ba4106bad2da83984018eaebb7d8479d87639fe1e1f1dd8296399ef8a3c7e71ad1ce05c176aebf2e004f51758f798d2b5d30c1db4d1fed9d0ce7c304ce0cda43bea2b91ed999635661033f1810c7f45d3a9fce8460ab4f6668c6e4239f0194f5b44fc4d2c80bbdff0111d44d6a8c31", 0xf2, 0x8}, {&(0x7f0000000380)="2efaca4fb3f62fa315b6b7af86d278d6447937278caf01623e742c2288e8d404ef1b4253afc109f35022f1fc8f86d207d2732dd6c4c2f7b50cb251912d0f0fc862c821d25cf9678677cea84ef7d0b6266ab959772d216b8ddcf17f5ef177c6832ff8865beea24fbb3f33eab8eee07b3467bcf37593248c6d0b4fd4d17a5b653e3f6558b98741731327499e197034be2292f2ee3fe36990eaa03760345db8108c5ac7c2c780ac76eb88a3272388e473b6b8f40bdd", 0xb4, 0x9}, {&(0x7f0000000540)="5c5e9f58ec3c94f18c8d38d029dd1e6948f9ee52967366926f9242a0d7c9fb22e605c487a80e10d93e8fc55544cf6e7aebd76b35bf275efa99d2ca5e46ba7178266510c6d58f4f4463163b2ac476e907c3ff4d8c4fc674f74b3ea544149287ac6ee294e704c8d363871279a8d32f74f54c33600a27084b1126f5856061f3b284ca2a495ed5152891d0e3ed0be2b1416350eda2d20a75523b04915d0173568e73590523d69712b56183322076a8c7dfa18e96572f3f787de2487d74c2021d744beed4627bc3e4fe7edc98886cd7307e4c8263873b74f52d4354ebecc972905a5a87b0", 0xe2, 0xfffffffffffff001}, {&(0x7f0000000640)="7412b2e5e4695deb52bc693ee83caafd815d1456403bb9eb92bdc40d19a0ddeab7a6386362f1aba1ef5848872f604043a96d0729705e4ac88635ba9796915399a77e833d28a1d89e0a404f28c32a469e9de157d119cdb85c1242be979891769245618c407de7dcbf85038f9f95d8a6b4b7f0d419c89f4d6c79edd25cba4f0cb21e58512a658dbb2e4b5a2ad7a39f22409c316a14c3d0930c5a8e7112f54a9487f557a801489df2551cd4163a66", 0xad, 0xfffffffffffff79f}, {&(0x7f0000000440)="010540a2effac001162a0e3dfa2b7dfa1a104adced333382b51cf40129776a5c1e5abbd09109866712240f70db74a6694d3712d4429e8f3d79898110799272509d3c16ffa04d5272404139a9515866c802718e50709290", 0x57, 0x9b69795}, {&(0x7f0000000700)="42c42c8b8c663cb448cc4420b7ee534fb039a03e2c4af5067a0adebe56e9e055b0010f70d4536bf30c209aa41c6d5a7823fa7aff213e3adedeb89be1b165f9d10316a96fa0312640097a", 0x4a, 0x6}, {&(0x7f0000000780)="9b3204624c0ec844e99e1d40c9fb1af51b2ccea9cf92d6591d13b7f1e3e0e08042eefdf0e37b1a7a372f2914633c5b34686668f566100aab56eb2e065333b8880be4c0a8db4267cfce675963c7e4", 0x4e, 0x7}, {&(0x7f0000000800)="262be85fa6801d75fc8be0943ed5949ed67c1f8e1382c2ee74d1ef67db07b12a1140348a8292", 0x26, 0x62}, {&(0x7f0000000840)="c5a9d99a25d37c7e76c9e2b830a972efbbedd2fe1c657dc5f0781b90fd4ec6c9ceb492ae742efedbb7d2128391093874680620a72e8a6e59982c8b42a14d8e84b00036a0a79c7ad251cd8dd228ab037b7453fd6d66f9cade0d9905", 0x5b, 0x10001}], 0x40000, &(0x7f00000009c0)={[{@nouser_xattr}, {@noload}, {@nouser_xattr}, {@minixdf}, {@grpjquota}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'veth0_to_bridge\x00'}}, {@fowner_gt={'fowner>', 0xee01}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x3, 0x1004, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:16:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xf903, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3023.598689] blktrace: Concurrent blktraces are not allowed on loop4 [ 3023.601446] blktrace: Concurrent blktraces are not allowed on loop8 [ 3023.626500] blktrace: Concurrent blktraces are not allowed on loop8 [ 3023.633924] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3023.633924] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.633924] [ 3023.648563] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3023.660710] EXT4-fs (loop6): get root inode failed [ 3023.661584] EXT4-fs (loop6): mount failed [ 3023.752888] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3023.752888] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.752888] [ 3023.764876] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3023.764876] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3023.764876] [ 3023.775794] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3023.778832] EXT4-fs (loop5): group descriptors corrupted! [ 3023.783775] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3023.786051] EXT4-fs (loop3): group descriptors corrupted! 01:16:46 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:46 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3037.291233] kauditd_printk_skb: 160 callbacks suppressed [ 3037.291250] audit: type=1326 audit(1713662206.698:21060): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.295647] audit: type=1326 audit(1713662206.698:21061): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.302660] audit: type=1326 audit(1713662206.698:21062): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.305946] audit: type=1326 audit(1713662206.699:21063): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 01:16:46 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xfd03, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:16:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3f, 0x0, 0x7, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x4, 0x81, 0x4, 0x6, 0x0, 0x6, 0x20000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000080), 0xe}, 0x100, 0xfd, 0x15e2, 0x0, 0x3, 0x2, 0x0, 0x0, 0xffffc81a, 0x0, 0x4c33}, r1, 0xa, 0xffffffffffffffff, 0x9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:16:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0", 0xd, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="13ea424fd5a6818111c8556c3820f0b4ea5785a9a2155caa0cdfd1f6659a03b30c7a10b8ea4526ec215f0941fa25c2f7c1f5c2655bfbe7e0994f9c8c7cf3b0c538358839c385470f360deb7368539b141ced862b1df44180d779d7"]) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r4, 0x1, 0x2, &(0x7f0000000000), &(0x7f0000000240)=0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'team0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 3037.338221] audit: type=1326 audit(1713662206.699:21064): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.351397] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3037.351397] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.351397] [ 3037.365210] audit: type=1326 audit(1713662206.699:21065): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.374876] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated 01:16:46 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3037.377965] audit: type=1326 audit(1713662206.700:21066): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.381634] EXT4-fs (loop6): get root inode failed [ 3037.382361] EXT4-fs (loop6): mount failed [ 3037.389187] blktrace: Concurrent blktraces are not allowed on loop8 [ 3037.393695] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3037.393695] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.393695] [ 3037.397642] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3037.398700] EXT4-fs (loop0): group descriptors corrupted! [ 3037.404104] blktrace: Concurrent blktraces are not allowed on loop8 [ 3037.404624] audit: type=1326 audit(1713662206.700:21067): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.413217] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3037.413217] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.413217] [ 3037.414567] audit: type=1326 audit(1713662206.700:21068): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.418196] audit: type=1326 audit(1713662206.700:21069): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16308 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3037.421169] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3037.422771] EXT4-fs (loop3): group descriptors corrupted! [ 3037.426668] blktrace: Concurrent blktraces are not allowed on loop4 01:16:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000180)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d86cc870092c61bd6cc19bd10376255e551330aa6612a7a0e7e5262f637e132f598541ebc0eff6d4d0e8f97bc0123d154b9061e24e435aca9fb0b341d14d1e9950585ccd0d3961a963fed3e3901069a5f025a37e556f61506e00b4b337b7fce40aebfcffffff0be7e69e"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:16:46 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3037.493005] blktrace: Concurrent blktraces are not allowed on loop8 [ 3037.520824] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3037.520824] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.520824] [ 3037.533896] blktrace: Concurrent blktraces are not allowed on loop8 01:16:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3037.554737] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3037.612014] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3037.612014] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.612014] [ 3037.624445] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3037.624445] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.624445] [ 3037.637159] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3037.638260] EXT4-fs (loop0): group descriptors corrupted! [ 3037.649291] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3037.651264] EXT4-fs (loop6): get root inode failed [ 3037.652310] EXT4-fs (loop6): mount failed 01:16:47 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:47 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x5, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:16:47 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x1034c0, 0x40) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000000c0)={'veth1_virt_wifi\x00'}) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r6, 0xc0189376, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100007f000000071ba5a6bd3413c9300018000000", @ANYRES32=r7, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00./file0\x00']) connect$inet6(r8, &(0x7f0000000240)={0xa, 0x4e22, 0x9, @mcast2, 0x9}, 0x1c) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:16:47 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000200), 0x111800, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r0, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ioctl$HIDIOCGRAWINFO(r3, 0x80084803, &(0x7f0000000280)=""/35) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)=ANY=[@ANYBLOB="000100000051b35c6fedad0d39d4ee9a182618000000000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000340)='./file0\x00', 0x44000000) inotify_add_watch(r4, &(0x7f0000000180)='./file0\x00', 0x4000000) write$binfmt_misc(r4, &(0x7f00000002c0)={'syz1', "3ad92d30aa0114465fa16bc4bd049859d5f68fd111d969e1bf74d4f1e73b82b44dc1489ceda9a5e789be626cde4f7552d4408065d1d620779d308bb46d2f851c4880f8256bb3add572d63f68e0bc5cdd6743c24f520a602938e90cad9ae2d4888001f5e304d4ac24c98231623797fd4064a9981292d09861e487"}, 0x7e) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x9, 0x9, 0x6, 0x6, 0x0, 0x4, 0x1200, 0xd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0xc}, 0x4409, 0xfdee, 0x6, 0x4, 0x2b, 0x7, 0xa83, 0x0, 0x1000, 0x0, 0x1f}, 0xffffffffffffffff, 0x10, r1, 0x0) [ 3037.751801] blktrace: Concurrent blktraces are not allowed on loop8 [ 3037.782086] blktrace: Concurrent blktraces are not allowed on loop4 [ 3037.792782] blktrace: Concurrent blktraces are not allowed on loop8 [ 3037.812648] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3037.812648] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.812648] [ 3037.824051] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3037.825101] EXT4-fs (loop0): group descriptors corrupted! [ 3037.833994] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3037.833994] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.833994] [ 3037.844899] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3037.844899] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.844899] [ 3037.845082] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3037.845082] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3037.845082] [ 3037.850754] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3037.854892] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3037.856353] EXT4-fs (loop3): group descriptors corrupted! [ 3037.864220] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3037.866639] EXT4-fs (loop6): get root inode failed [ 3037.867188] EXT4-fs (loop6): mount failed [ 3050.195417] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3050.195417] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3050.195417] 01:16:59 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:59 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:59 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:59 executing program 4: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x5, 0x0, &(0x7f0000000280)="aa026f1edeb9fd6412f0edd9210237b5437f3d7c4fe3cd177774d0e85d41067d50b6dfa8a950f327420401cad6e03cbbb30cd6e503fe15da342305b2d779f42c779eb30762c249c9b0cf574fe04e3e487b13cf22215e02ec9a731e6247c7d0d80bb12e613c303bd9132b808ab94cd2b5b3a92c4178e88000dd869542dfecd92f660610e58bae4df8e6b4333b35f2733a38b529cc27f3f06a9163a060d36a521b0031b4c71ff7270f4d90b32ad970735dcd0e05fb235e05f47042cf983931d436daa8e8223fdf216ed6d5ea9ea3feddc7f411eda777b3d8f8", 0x1, 0x0, 0x1, {0x1}}, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/fib_trie\x00') mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) accept4(0xffffffffffffffff, &(0x7f00000000c0)=@isdn, &(0x7f0000000180)=0x80, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03a5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd1037600000000000000"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:16:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x14, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:16:59 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:16:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @ETHTOOL_A_LINKMODES_OURS={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vlan0\x00'}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 3050.210114] kauditd_printk_skb: 184 callbacks suppressed [ 3050.210134] audit: type=1326 audit(1713662219.617:21254): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.215195] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3050.215195] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3050.215195] [ 3050.217519] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3050.218360] EXT4-fs (loop0): group descriptors corrupted! [ 3050.219578] audit: type=1326 audit(1713662219.626:21255): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16390 comm="syz-executor.3" exe="/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f72dd012b19 code=0x7ffc0000 [ 3050.230315] audit: type=1326 audit(1713662219.631:21256): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.232663] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3050.232992] audit: type=1326 audit(1713662219.632:21257): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.236720] audit: type=1326 audit(1713662219.632:21258): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.238995] audit: type=1326 audit(1713662219.632:21259): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.240359] EXT4-fs (loop6): get root inode failed [ 3050.241206] audit: type=1326 audit(1713662219.633:21260): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.241725] EXT4-fs (loop6): mount failed [ 3050.243671] audit: type=1326 audit(1713662219.633:21261): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.246674] audit: type=1326 audit(1713662219.633:21262): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.248712] audit: type=1326 audit(1713662219.633:21263): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16380 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3050.290286] blktrace: Concurrent blktraces are not allowed on loop4 [ 3050.298283] blktrace: Concurrent blktraces are not allowed on loop8 01:16:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3050.330577] blktrace: Concurrent blktraces are not allowed on loop8 01:16:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x5, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3050.359851] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3050.359851] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3050.359851] [ 3050.361729] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3050.362601] EXT4-fs (loop0): group descriptors corrupted! [ 3050.375384] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3050.375384] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3050.375384] [ 3050.384936] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3050.385911] EXT4-fs (loop3): group descriptors corrupted! [ 3050.386896] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3050.386896] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3050.386896] [ 3050.398066] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3050.446382] blktrace: Concurrent blktraces are not allowed on loop8 01:17:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x15, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:17:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x7a00, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:17:11 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed410000000800", 0x7, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:11 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x46, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xde}, 0x0, 0x7, 0x1004, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 3062.501427] kauditd_printk_skb: 123 callbacks suppressed [ 3062.501449] audit: type=1326 audit(1713662231.906:21387): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.505605] audit: type=1326 audit(1713662231.908:21388): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:17:11 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:11 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3062.516116] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3062.516116] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.516116] [ 3062.521143] audit: type=1326 audit(1713662231.908:21389): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.529071] audit: type=1326 audit(1713662231.908:21390): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.534574] audit: type=1326 audit(1713662231.916:21391): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.539053] audit: type=1326 audit(1713662231.916:21392): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.544709] audit: type=1326 audit(1713662231.916:21393): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.548879] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3062.551408] EXT4-fs (loop6): get root inode failed [ 3062.552246] EXT4-fs (loop6): mount failed [ 3062.568735] audit: type=1326 audit(1713662231.917:21394): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.573351] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3062.573351] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.573351] [ 3062.575672] audit: type=1326 audit(1713662231.917:21395): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.576987] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3062.580158] EXT4-fs (loop0): group descriptors corrupted! [ 3062.593691] blktrace: Concurrent blktraces are not allowed on loop2 [ 3062.600956] audit: type=1326 audit(1713662231.917:21396): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16428 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3062.622567] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3062.622567] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.622567] [ 3062.633365] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3062.633365] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.633365] [ 3062.636191] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3062.637639] EXT4-fs (loop3): group descriptors corrupted! [ 3062.640404] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) 01:17:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x16, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:17:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x15, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:17:12 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @local, @local}, 0xfffffffffffffedc) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000240)={@local, 0x5c}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x46, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0xde}, 0x0, 0x7, 0x1004, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 3062.714291] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3062.714291] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.714291] [ 3062.723780] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) 01:17:12 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 3062.749209] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3062.749209] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.749209] [ 3062.764553] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3062.765881] EXT4-fs (loop0): group descriptors corrupted! 01:17:12 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3062.801706] blktrace: Concurrent blktraces are not allowed on loop4 [ 3062.815978] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3062.815978] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.815978] [ 3062.843398] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3062.845402] EXT4-fs (loop6): get root inode failed [ 3062.846252] EXT4-fs (loop6): mount failed 01:17:12 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:12 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3062.962366] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3062.962366] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3062.962366] [ 3063.000076] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3063.006049] EXT4-fs (loop6): get root inode failed [ 3063.007114] EXT4-fs (loop6): mount failed [ 3063.009457] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3063.009457] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3063.009457] [ 3063.018930] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3063.020369] EXT4-fs (loop3): group descriptors corrupted! [ 3063.033868] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3063.033868] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3063.033868] [ 3063.045732] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3063.045732] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3063.045732] [ 3063.045829] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3063.049663] EXT4-fs (loop0): group descriptors corrupted! [ 3063.051937] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3075.184525] kauditd_printk_skb: 159 callbacks suppressed [ 3075.184536] audit: type=1326 audit(1713662244.591:21556): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.186695] audit: type=1326 audit(1713662244.592:21557): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:17:24 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3075.188770] audit: type=1326 audit(1713662244.596:21558): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.190848] audit: type=1326 audit(1713662244.596:21559): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.198410] audit: type=1326 audit(1713662244.596:21560): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.201830] audit: type=1326 audit(1713662244.598:21561): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.203636] audit: type=1326 audit(1713662244.598:21562): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.205699] audit: type=1326 audit(1713662244.598:21563): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.211868] audit: type=1326 audit(1713662244.608:21564): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3075.214677] audit: type=1326 audit(1713662244.619:21565): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16490 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:17:24 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x17, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:17:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:17:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3075.240754] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3075.240754] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.240754] [ 3075.242340] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3075.243165] EXT4-fs (loop0): group descriptors corrupted! [ 3075.249154] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3075.249154] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.249154] 01:17:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3075.300197] blktrace: Concurrent blktraces are not allowed on loop4 [ 3075.319053] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3075.321857] EXT4-fs (loop6): get root inode failed [ 3075.322783] EXT4-fs (loop6): mount failed [ 3075.355841] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3075.355841] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.355841] [ 3075.364034] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3075.364034] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.364034] [ 3075.374002] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3075.375613] EXT4-fs (loop0): group descriptors corrupted! [ 3075.377786] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3075.378703] EXT4-fs (loop3): group descriptors corrupted! [ 3075.379601] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3075.379601] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.379601] [ 3075.388100] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3075.388100] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.388100] [ 3075.390208] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (8 blocks) 01:17:24 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3075.405884] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3075.406681] EXT4-fs (loop7): group descriptors corrupted! 01:17:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:17:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x18, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3075.472266] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3075.472266] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.472266] [ 3075.495331] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3075.499344] EXT4-fs (loop6): get root inode failed [ 3075.499802] EXT4-fs (loop6): mount failed 01:17:24 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3075.533046] blktrace: Concurrent blktraces are not allowed on loop4 01:17:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:24 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3075.568288] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3075.568288] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.568288] 01:17:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3075.598014] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 3075.614271] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3075.614271] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.614271] [ 3075.627260] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3075.628719] EXT4-fs (loop6): get root inode failed [ 3075.629132] EXT4-fs (loop6): mount failed [ 3075.643266] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3075.643266] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.643266] [ 3075.644088] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3075.644088] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.644088] [ 3075.651592] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3075.651592] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3075.651592] [ 3075.653217] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3075.654014] EXT4-fs (loop7): group descriptors corrupted! [ 3075.655673] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3075.656049] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3075.656412] EXT4-fs (loop0): group descriptors corrupted! [ 3075.658904] EXT4-fs (loop3): group descriptors corrupted! 01:17:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:37 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3087.777105] kauditd_printk_skb: 266 callbacks suppressed [ 3087.777125] audit: type=1326 audit(1713662257.184:21832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16560 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3087.785620] audit: type=1326 audit(1713662257.184:21833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16560 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3087.807916] audit: type=1326 audit(1713662257.185:21834): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16560 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:17:37 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:37 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:37 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:37 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x19, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3087.819812] audit: type=1326 audit(1713662257.185:21835): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16560 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3087.829456] audit: type=1326 audit(1713662257.197:21836): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16560 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3087.830673] blktrace: Concurrent blktraces are not allowed on loop4 [ 3087.833819] audit: type=1326 audit(1713662257.198:21837): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16560 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3087.837206] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3087.837206] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3087.837206] [ 3087.837223] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3087.837223] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3087.837223] [ 3087.844222] audit: type=1326 audit(1713662257.198:21838): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16568 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3087.849866] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3087.851233] EXT4-fs (loop0): group descriptors corrupted! [ 3087.854377] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3087.856293] audit: type=1326 audit(1713662257.199:21839): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16568 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3087.860018] EXT4-fs (loop6): get root inode failed [ 3087.860790] EXT4-fs (loop6): mount failed [ 3087.869977] audit: type=1326 audit(1713662257.199:21840): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16568 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3087.883299] audit: type=1326 audit(1713662257.199:21841): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16568 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3087.906783] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3087.906783] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3087.906783] 01:17:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3087.917909] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3087.917909] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3087.917909] [ 3087.938024] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3087.939479] EXT4-fs (loop7): group descriptors corrupted! [ 3087.950036] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3087.950036] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3087.950036] 01:17:37 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1a, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3087.959617] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3087.961136] EXT4-fs (loop3): group descriptors corrupted! 01:17:37 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3087.980994] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3087.980994] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3087.980994] [ 3087.988153] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 3087.997361] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (8 blocks) 01:17:37 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3088.029583] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3088.029583] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3088.029583] [ 3088.040155] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3088.040511] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3088.040511] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3088.040511] [ 3088.041588] EXT4-fs (loop0): group descriptors corrupted! [ 3088.050828] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3088.055700] EXT4-fs (loop6): get root inode failed [ 3088.056525] EXT4-fs (loop6): mount failed [ 3088.066782] blktrace: Concurrent blktraces are not allowed on loop4 01:17:52 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1b, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3102.708987] kauditd_printk_skb: 122 callbacks suppressed [ 3102.709006] audit: type=1326 audit(1713662272.116:21964): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16612 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 01:17:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3102.724652] audit: type=1326 audit(1713662272.131:21965): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16612 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3102.739970] audit: type=1326 audit(1713662272.139:21966): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.758325] audit: type=1326 audit(1713662272.139:21967): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.764843] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3102.764843] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3102.764843] [ 3102.766611] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3102.766611] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3102.766611] [ 3102.771376] blktrace: Concurrent blktraces are not allowed on loop4 [ 3102.773404] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3102.774844] EXT4-fs (loop0): group descriptors corrupted! [ 3102.775904] audit: type=1326 audit(1713662272.140:21968): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.776684] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3102.779319] audit: type=1326 audit(1713662272.140:21969): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.780513] EXT4-fs (loop6): group descriptors corrupted! [ 3102.785862] audit: type=1326 audit(1713662272.145:21970): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.791133] audit: type=1326 audit(1713662272.145:21971): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.794657] audit: type=1326 audit(1713662272.145:21972): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.800082] audit: type=1326 audit(1713662272.145:21973): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16620 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3102.836661] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3102.836661] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3102.836661] [ 3102.859407] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3102.860804] EXT4-fs (loop7): group descriptors corrupted! 01:17:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3102.872737] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3102.872737] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3102.872737] 01:17:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3102.892654] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3102.892654] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3102.892654] [ 3102.897842] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3102.899733] EXT4-fs (loop3): group descriptors corrupted! 01:17:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1c, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3102.912976] EXT4-fs (loop4): mounted filesystem without journal. Opts: noacl,,errors=continue 01:17:52 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3102.995969] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3102.995969] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3102.995969] 01:17:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3103.064622] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3103.064622] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3103.064622] [ 3103.081075] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3103.081075] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3103.081075] [ 3103.089097] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3103.090495] EXT4-fs (loop0): group descriptors corrupted! [ 3103.103293] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3103.106120] EXT4-fs (loop6): group descriptors corrupted! [ 3103.130815] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3103.130815] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3103.130815] [ 3103.132003] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3103.132003] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3103.132003] [ 3103.136346] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3103.137988] EXT4-fs (loop3): group descriptors corrupted! [ 3103.147904] EXT4-fs (loop5): mounted filesystem without journal. Opts: noacl,,errors=continue [ 3103.156154] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3103.157494] EXT4-fs (loop7): group descriptors corrupted! [ 3103.186202] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3103.186202] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3103.186202] 01:17:52 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:17:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3103.232626] EXT4-fs error (device loop4): ext4_fill_super:4962: inode #2: comm syz-executor.4: iget: special inode unallocated [ 3103.235198] EXT4-fs (loop4): get root inode failed [ 3103.236125] EXT4-fs (loop4): mount failed [ 3103.361363] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3103.361363] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3103.361363] [ 3103.375183] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3103.376590] EXT4-fs (loop0): group descriptors corrupted! [ 3103.421510] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3103.421510] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3103.421510] [ 3103.439660] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3103.441072] EXT4-fs (loop3): group descriptors corrupted! [ 3117.714663] kauditd_printk_skb: 241 callbacks suppressed [ 3117.714683] audit: type=1326 audit(1713662287.121:22215): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3117.734618] audit: type=1326 audit(1713662287.123:22216): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:18:07 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1d, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:18:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r4}, 0x14) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) 01:18:07 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3117.742610] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3117.742610] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3117.742610] [ 3117.749348] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3117.753702] audit: type=1326 audit(1713662287.123:22217): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3117.770830] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3117.770830] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3117.770830] [ 3117.776391] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3117.776391] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3117.776391] [ 3117.780746] audit: type=1326 audit(1713662287.123:22218): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3117.816682] EXT4-fs (loop4): mounted filesystem without journal. Opts: noacl,,errors=continue [ 3117.818584] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3117.820095] EXT4-fs (loop6): group descriptors corrupted! [ 3117.821878] audit: type=1326 audit(1713662287.126:22219): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:18:07 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0xfffffc01}, 0x1c) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r4}, 0x14) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) [ 3117.836922] audit: type=1326 audit(1713662287.127:22220): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:18:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3117.854757] audit: type=1326 audit(1713662287.127:22221): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:18:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1e, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3117.870860] audit: type=1326 audit(1713662287.127:22222): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3117.888039] audit: type=1326 audit(1713662287.127:22223): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3117.907399] audit: type=1326 audit(1713662287.129:22224): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16685 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:18:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x21, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3117.923428] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:18:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3117.943690] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3117.943690] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3117.943690] [ 3117.949516] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3117.949516] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3117.949516] [ 3117.952842] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3117.958931] blktrace: Concurrent blktraces are not allowed on loop4 [ 3117.959813] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3117.961651] EXT4-fs (loop3): group descriptors corrupted! [ 3117.966690] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3117.966690] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3117.966690] [ 3117.977967] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3117.979575] EXT4-fs (loop7): group descriptors corrupted! 01:18:07 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3118.078285] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3118.078285] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3118.078285] [ 3118.097984] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) 01:18:07 executing program 3: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x22, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:18:07 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3118.160817] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3118.160817] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3118.160817] [ 3118.167083] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3118.168496] EXT4-fs (loop7): group descriptors corrupted! [ 3118.208280] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3118.211493] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3118.211493] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3118.211493] [ 3118.213776] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3118.214425] EXT4-fs (loop6): group descriptors corrupted! [ 3118.269902] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3118.269902] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3118.269902] [ 3118.272505] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3118.283077] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3118.283077] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3118.283077] [ 3118.311526] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3118.313058] EXT4-fs (loop3): group descriptors corrupted! 01:18:21 executing program 3: flock(0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:21 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:21 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:21 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:21 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3131.929313] kauditd_printk_skb: 205 callbacks suppressed 01:18:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x23, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3131.929331] audit: type=1326 audit(1713662301.336:22430): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:18:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:21 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3131.949010] audit: type=1326 audit(1713662301.336:22431): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.962360] audit: type=1326 audit(1713662301.338:22432): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.964868] audit: type=1326 audit(1713662301.338:22433): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.967030] audit: type=1326 audit(1713662301.338:22434): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.969593] audit: type=1326 audit(1713662301.339:22435): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.973006] audit: type=1326 audit(1713662301.339:22436): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.975502] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3131.975502] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3131.975502] [ 3131.983693] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3131.985628] audit: type=1326 audit(1713662301.339:22437): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.990873] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3131.990873] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3131.990873] [ 3131.992817] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3131.992817] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3131.992817] [ 3131.994587] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3131.995390] EXT4-fs (loop6): group descriptors corrupted! [ 3131.996068] audit: type=1326 audit(1713662301.339:22438): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3131.997140] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3132.000117] EXT4-fs (loop3): group descriptors corrupted! [ 3132.000889] audit: type=1326 audit(1713662301.346:22440): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16757 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3132.039034] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3132.039034] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3132.039034] [ 3132.044687] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3132.045545] EXT4-fs (loop7): group descriptors corrupted! 01:18:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3132.066907] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3132.066907] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3132.066907] [ 3132.075957] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3132.076969] EXT4-fs (loop4): group descriptors corrupted! [ 3132.113885] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3132.128808] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3132.128808] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3132.128808] [ 3132.137060] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3132.137060] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3132.137060] [ 3132.139316] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3132.140777] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3132.141541] EXT4-fs (loop3): group descriptors corrupted! 01:18:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x24, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:35 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3146.186289] kauditd_printk_skb: 148 callbacks suppressed [ 3146.186307] audit: type=1326 audit(1713662315.593:22588): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.190734] audit: type=1326 audit(1713662315.593:22589): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 01:18:35 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:35 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:35 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3146.201339] audit: type=1326 audit(1713662315.593:22590): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.212727] audit: type=1326 audit(1713662315.593:22591): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.216092] blktrace: Concurrent blktraces are not allowed on loop4 [ 3146.220470] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3146.220470] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3146.220470] [ 3146.224357] audit: type=1326 audit(1713662315.593:22592): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.228627] EXT4-fs error (device loop0): ext4_fill_super:4962: inode #2: comm syz-executor.0: iget: special inode unallocated [ 3146.230780] EXT4-fs (loop0): get root inode failed [ 3146.231599] EXT4-fs (loop0): mount failed [ 3146.233581] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3146.233581] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3146.233581] [ 3146.236852] audit: type=1326 audit(1713662315.594:22593): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.240856] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3146.241665] EXT4-fs (loop6): group descriptors corrupted! [ 3146.241693] audit: type=1326 audit(1713662315.594:22594): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.245781] audit: type=1326 audit(1713662315.594:22595): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.249359] audit: type=1326 audit(1713662315.594:22596): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 [ 3146.252879] audit: type=1326 audit(1713662315.594:22597): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16803 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f6b70174b19 code=0x7ffc0000 01:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3146.279691] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3146.279691] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3146.279691] [ 3146.284635] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3146.285389] EXT4-fs (loop7): group descriptors corrupted! 01:18:35 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3146.320784] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:18:35 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x25, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:18:35 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:35 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3146.385949] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3146.385949] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3146.385949] [ 3146.399844] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3146.399844] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3146.399844] [ 3146.404715] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3146.406370] EXT4-fs (loop4): group descriptors corrupted! [ 3146.416157] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) 01:18:35 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3146.462396] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3146.462396] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3146.462396] [ 3146.475359] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3146.476814] EXT4-fs (loop6): group descriptors corrupted! [ 3146.485471] blktrace: Concurrent blktraces are not allowed on loop4 [ 3146.503795] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3146.503795] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3146.503795] [ 3146.520524] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3146.522719] EXT4-fs (loop7): group descriptors corrupted! 01:18:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='romfs\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x82040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000050000000c00018008000100", @ANYRES32=r4, @ANYBLOB="6ddcef208e34821830761406d027ab19ebac3cadb6643e21132766b25e9bfcc8c351cab683461502a58d07b4ef9d660fe5614e5dcb2120e376463e89db79f0a819a8e1484afd8998a85599b529"], 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_to_bridge\x00'}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/rtc', 0x4800, 0x40) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r8}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'veth0_to_bridge\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x45, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00'}) 01:18:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x26, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:18:51 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3162.146919] kauditd_printk_skb: 159 callbacks suppressed [ 3162.146936] audit: type=1326 audit(1713662331.554:22757): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.155577] audit: type=1326 audit(1713662331.561:22758): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.166587] audit: type=1326 audit(1713662331.561:22759): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.183037] audit: type=1326 audit(1713662331.561:22760): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.187569] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3162.187569] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3162.187569] [ 3162.196491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3162.198241] audit: type=1326 audit(1713662331.562:22761): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.202253] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:18:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3162.203630] EXT4-fs (loop6): group descriptors corrupted! [ 3162.211816] audit: type=1326 audit(1713662331.562:22762): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.218775] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 3162.218775] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3162.218775] [ 3162.227972] EXT4-fs (loop0): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3162.233714] blktrace: Concurrent blktraces are not allowed on loop4 [ 3162.236010] audit: type=1326 audit(1713662331.562:22763): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.243082] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3162.243082] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3162.243082] [ 3162.246364] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3162.247798] EXT4-fs (loop7): group descriptors corrupted! [ 3162.252329] audit: type=1326 audit(1713662331.562:22764): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16852 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3162.256900] audit: type=1326 audit(1713662331.577:22765): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16860 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f805a381b19 code=0x7ffc0000 [ 3162.264135] audit: type=1326 audit(1713662331.577:22766): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16860 comm="syz-executor.7" exe="/syz-executor.7" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f805a381b19 code=0x7ffc0000 01:18:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 7: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) fsetxattr$security_capability(r3, &(0x7f0000000000), &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0x9}, {0x5, 0xfffffff9}], r4}, 0x18, 0x0) mount$9p_xen(&(0x7f0000000080), &(0x7f00000000c0)='\x00', &(0x7f0000000100), 0x800000, &(0x7f0000000280)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cachetag={'cachetag', 0x3d, '/dev/loop-control\x00'}}, {@version_9p2000}, {@privport}, {@cache_loose}, {@debug}], [{@measure}, {@uid_gt={'uid>', r4}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1712d87acc4840a32c0d3f9fbfeff2d2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 3162.370087] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:18:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x27, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3162.419276] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3162.419276] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3162.419276] [ 3162.448164] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3162.449651] EXT4-fs (loop4): group descriptors corrupted! [ 3162.462419] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3162.462419] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3162.462419] [ 3162.466597] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3162.468057] EXT4-fs (loop6): group descriptors corrupted! [ 3162.477184] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3162.477184] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3162.477184] [ 3162.490550] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3162.492006] EXT4-fs (loop7): group descriptors corrupted! 01:18:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3162.601721] blktrace: Concurrent blktraces are not allowed on loop4 01:18:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:18:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3162.739606] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:19:05 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 7: flock(0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3175.889902] kauditd_printk_skb: 163 callbacks suppressed [ 3175.889913] audit: type=1326 audit(1713662345.289:22930): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.892683] audit: type=1326 audit(1713662345.300:22931): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.895229] audit: type=1326 audit(1713662345.302:22932): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.903762] audit: type=1326 audit(1713662345.302:22933): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:19:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x28, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3175.914045] audit: type=1326 audit(1713662345.302:22934): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.923651] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3175.923651] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3175.923651] [ 3175.925297] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3175.925297] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3175.925297] [ 3175.928821] audit: type=1326 audit(1713662345.313:22935): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.935182] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3175.936056] EXT4-fs (loop7): group descriptors corrupted! [ 3175.937034] audit: type=1326 audit(1713662345.313:22936): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.941514] audit: type=1326 audit(1713662345.313:22937): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.946887] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3175.946887] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3175.946887] [ 3175.950920] audit: type=1326 audit(1713662345.316:22938): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3175.951602] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3175.954168] EXT4-fs (loop6): group descriptors corrupted! [ 3175.955291] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3175.956125] EXT4-fs (loop4): group descriptors corrupted! [ 3175.963357] audit: type=1326 audit(1713662345.316:22939): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16911 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:19:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3176.044512] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3176.068274] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3176.068274] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3176.068274] [ 3176.079019] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3176.079793] EXT4-fs (loop7): group descriptors corrupted! [ 3176.152819] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3176.152819] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3176.152819] [ 3176.169495] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3176.170947] EXT4-fs (loop4): group descriptors corrupted! 01:19:23 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x29, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:19:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3194.276910] kauditd_printk_skb: 153 callbacks suppressed [ 3194.276924] audit: type=1326 audit(1713662363.683:23093): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.279374] audit: type=1326 audit(1713662363.683:23094): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.285283] audit: type=1326 audit(1713662363.683:23095): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.287311] audit: type=1326 audit(1713662363.684:23096): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.298760] audit: type=1326 audit(1713662363.684:23097): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.305618] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3194.305618] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3194.305618] [ 3194.314526] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3194.315266] EXT4-fs (loop6): group descriptors corrupted! 01:19:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3194.325855] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3194.325855] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3194.325855] [ 3194.333730] blktrace: Concurrent blktraces are not allowed on loop4 [ 3194.333795] audit: type=1326 audit(1713662363.688:23098): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.336674] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3194.337454] EXT4-fs (loop4): group descriptors corrupted! [ 3194.353034] audit: type=1326 audit(1713662363.689:23099): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.360253] audit: type=1326 audit(1713662363.689:23100): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3194.392576] audit: type=1326 audit(1713662363.689:23101): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:19:23 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) fsetxattr$security_capability(r3, &(0x7f0000000000), &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0x9}, {0x5, 0xfffffff9}], r4}, 0x18, 0x0) mount$9p_xen(&(0x7f0000000080), &(0x7f00000000c0)='\x00', &(0x7f0000000100), 0x800000, &(0x7f0000000280)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cachetag={'cachetag', 0x3d, '/dev/loop-control\x00'}}, {@version_9p2000}, {@privport}, {@cache_loose}, {@debug}], [{@measure}, {@uid_gt={'uid>', r4}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1712d87acc4840a32c0d3f9fbfeff2d2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:19:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3194.401846] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3194.406935] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3194.406935] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3194.406935] [ 3194.410238] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3194.411011] EXT4-fs (loop3): group descriptors corrupted! [ 3194.415183] audit: type=1326 audit(1713662363.689:23102): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16948 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:19:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2a, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:19:23 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3194.509212] blktrace: Concurrent blktraces are not allowed on loop4 01:19:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3194.550422] blktrace: Concurrent blktraces are not allowed on loop2 [ 3194.555980] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3194.555980] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3194.555980] [ 3194.558986] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3194.560478] EXT4-fs (loop4): group descriptors corrupted! 01:19:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3194.584659] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3194.584659] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3194.584659] [ 3194.595086] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3194.596195] EXT4-fs (loop6): group descriptors corrupted! [ 3194.619901] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3194.619901] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3194.619901] [ 3194.644376] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3194.645997] EXT4-fs (loop3): group descriptors corrupted! [ 3194.683762] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:19:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) fsetxattr$security_capability(r3, &(0x7f0000000000), &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0x9}, {0x5, 0xfffffff9}], r4}, 0x18, 0x0) mount$9p_xen(&(0x7f0000000080), &(0x7f00000000c0)='\x00', &(0x7f0000000100), 0x800000, &(0x7f0000000280)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cachetag={'cachetag', 0x3d, '/dev/loop-control\x00'}}, {@version_9p2000}, {@privport}, {@cache_loose}, {@debug}], [{@measure}, {@uid_gt={'uid>', r4}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1712d87acc4840a32c0d3f9fbfeff2d2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 01:19:38 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3209.093538] kauditd_printk_skb: 144 callbacks suppressed [ 3209.093550] audit: type=1326 audit(1713662378.498:23247): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.096670] audit: type=1326 audit(1713662378.498:23248): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.100641] audit: type=1326 audit(1713662378.504:23249): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.116648] audit: type=1326 audit(1713662378.506:23250): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:19:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2b, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:19:38 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3209.122547] audit: type=1326 audit(1713662378.506:23251): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.127017] audit: type=1326 audit(1713662378.508:23252): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.129250] audit: type=1326 audit(1713662378.508:23253): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.133297] audit: type=1326 audit(1713662378.508:23254): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.134203] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3209.134203] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3209.134203] [ 3209.135640] audit: type=1326 audit(1713662378.512:23255): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.139630] audit: type=1326 audit(1713662378.512:23256): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17006 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3209.155624] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3209.155624] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3209.155624] [ 3209.157360] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3209.157360] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3209.157360] [ 3209.157755] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3209.160437] EXT4-fs (loop4): group descriptors corrupted! [ 3209.161198] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3209.165171] blktrace: Concurrent blktraces are not allowed on loop2 [ 3209.170747] blktrace: Concurrent blktraces are not allowed on loop4 [ 3209.175458] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3209.176259] EXT4-fs (loop6): group descriptors corrupted! [ 3209.224467] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:19:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:52 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:52 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3222.911528] kauditd_printk_skb: 74 callbacks suppressed [ 3222.911548] audit: type=1326 audit(1713662392.316:23331): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17034 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:19:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) fsetxattr$security_capability(r3, &(0x7f0000000000), &(0x7f00000005c0)=@v3={0x3000000, [{0x2, 0x9}, {0x5, 0xfffffff9}], r4}, 0x18, 0x0) mount$9p_xen(&(0x7f0000000080), &(0x7f00000000c0)='\x00', &(0x7f0000000100), 0x800000, &(0x7f0000000280)={'trans=xen,', {[{@version_u}, {@cache_loose}, {@cachetag={'cachetag', 0x3d, '/dev/loop-control\x00'}}, {@version_9p2000}, {@privport}, {@cache_loose}, {@debug}], [{@measure}, {@uid_gt={'uid>', r4}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1712d87acc4840a32c0d3f9fbfeff2d2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 3222.923857] audit: type=1326 audit(1713662392.324:23332): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17037 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:19:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2c, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:19:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3222.936018] blktrace: Concurrent blktraces are not allowed on loop2 [ 3222.944983] audit: type=1326 audit(1713662392.324:23333): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17037 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3222.951360] blktrace: Concurrent blktraces are not allowed on loop4 [ 3222.954598] audit: type=1326 audit(1713662392.325:23334): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17034 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3222.959527] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3222.959527] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3222.959527] 01:19:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3222.965735] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3222.969223] audit: type=1326 audit(1713662392.325:23335): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17034 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3222.974060] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3222.974060] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3222.974060] [ 3222.980274] audit: type=1326 audit(1713662392.325:23336): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17034 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3222.993754] audit: type=1326 audit(1713662392.325:23337): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17034 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3222.995770] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3222.997079] EXT4-fs (loop6): group descriptors corrupted! [ 3222.997566] audit: type=1326 audit(1713662392.325:23338): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17037 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3223.000974] audit: type=1326 audit(1713662392.326:23339): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17037 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:19:52 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x102, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:19:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.033891] audit: type=1326 audit(1713662392.326:23340): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17037 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:19:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.059519] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3223.059519] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3223.059519] [ 3223.080545] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3223.081930] EXT4-fs (loop4): group descriptors corrupted! [ 3223.111263] blktrace: Concurrent blktraces are not allowed on loop4 01:19:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.170152] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 01:19:52 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.210298] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3223.210298] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3223.210298] 01:19:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.214374] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3223.215797] EXT4-fs (loop4): group descriptors corrupted! [ 3223.230322] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3223.230322] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3223.230322] 01:19:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.241534] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 01:19:52 executing program 1: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:19:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x10a, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:19:52 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.308502] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3223.308502] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3223.308502] 01:19:52 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.325985] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3223.327349] EXT4-fs (loop6): group descriptors corrupted! 01:19:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3223.449787] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3223.449787] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3223.449787] [ 3223.467961] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3223.469327] EXT4-fs (loop4): group descriptors corrupted! [ 3223.475568] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3236.524272] kauditd_printk_skb: 228 callbacks suppressed [ 3236.524284] audit: type=1326 audit(1713662405.931:23569): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:05 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:05 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3236.542804] audit: type=1326 audit(1713662405.950:23570): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.545639] audit: type=1326 audit(1713662405.952:23571): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.547697] audit: type=1326 audit(1713662405.952:23572): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.553822] blktrace: Concurrent blktraces are not allowed on loop2 [ 3236.555572] audit: type=1326 audit(1713662405.953:23573): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.562795] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3236.562795] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3236.562795] [ 3236.564384] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3236.569905] audit: type=1326 audit(1713662405.957:23574): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x148, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:20:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3236.579466] audit: type=1326 audit(1713662405.957:23575): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.587984] audit: type=1326 audit(1713662405.957:23576): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.595732] audit: type=1326 audit(1713662405.960:23577): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.601613] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3236.601613] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3236.601613] [ 3236.602787] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3236.602787] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3236.602787] [ 3236.606759] audit: type=1326 audit(1713662405.960:23578): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17102 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3236.614553] EXT4-fs (loop6): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 3236.615324] EXT4-fs (loop6): group descriptors corrupted! [ 3236.624618] blktrace: Concurrent blktraces are not allowed on loop4 01:20:06 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3236.639984] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 3236.641575] EXT4-fs (loop5): get root inode failed [ 3236.642054] EXT4-fs (loop5): mount failed 01:20:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3236.652583] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3236.652583] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3236.652583] [ 3236.654760] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3236.655571] EXT4-fs (loop4): group descriptors corrupted! 01:20:06 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3236.718209] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3236.718209] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3236.718209] [ 3236.724157] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 01:20:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x14c, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:20:06 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3236.778747] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3236.778747] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3236.778747] [ 3236.783086] blktrace: Concurrent blktraces are not allowed on loop4 [ 3236.793228] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 3236.796275] EXT4-fs (loop5): get root inode failed [ 3236.797056] EXT4-fs (loop5): mount failed [ 3236.833760] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3236.833760] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3236.833760] [ 3236.840600] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3236.841320] EXT4-fs (loop6): group descriptors corrupted! 01:20:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x168, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:20:18 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:20:18 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3249.218304] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3249.218304] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.218304] [ 3249.220218] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.221115] EXT4-fs (loop7): group descriptors corrupted! [ 3249.228106] kauditd_printk_skb: 93 callbacks suppressed [ 3249.228126] audit: type=1326 audit(1713662418.635:23672): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17157 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3249.239857] audit: type=1326 audit(1713662418.643:23673): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17153 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3249.257614] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3249.257614] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.257614] [ 3249.259380] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.260229] EXT4-fs (loop4): group descriptors corrupted! 01:20:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3249.263684] blktrace: Concurrent blktraces are not allowed on loop4 [ 3249.265492] audit: type=1326 audit(1713662418.643:23674): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17153 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3249.268943] audit: type=1326 audit(1713662418.645:23675): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17157 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3249.275131] audit: type=1326 audit(1713662418.645:23676): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17157 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3249.278734] audit: type=1326 audit(1713662418.645:23677): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17157 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3249.282864] audit: type=1326 audit(1713662418.646:23679): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17153 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3249.286456] audit: type=1326 audit(1713662418.646:23680): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17153 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3249.288708] audit: type=1326 audit(1713662418.647:23681): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17153 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 [ 3249.290717] audit: type=1326 audit(1713662418.647:23682): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17153 comm="syz-executor.4" exe="/syz-executor.4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1eb4a1eb19 code=0x7ffc0000 01:20:18 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3249.304123] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3249.304123] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.304123] [ 3249.311732] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3249.344570] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3249.344570] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.344570] [ 3249.354596] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3249.354596] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.354596] [ 3249.363046] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.363859] EXT4-fs (loop7): group descriptors corrupted! [ 3249.365921] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.367292] EXT4-fs (loop6): group descriptors corrupted! 01:20:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x16c, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3249.403694] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3249.403694] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.403694] 01:20:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3249.422049] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.423488] EXT4-fs (loop4): group descriptors corrupted! [ 3249.424843] EXT4-fs (loop5): Mount option "noacl" will be removed by 3.5 [ 3249.424843] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.424843] 01:20:18 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3249.464759] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3249.464759] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.464759] [ 3249.468475] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.469249] EXT4-fs (loop3): group descriptors corrupted! [ 3249.474704] EXT4-fs error (device loop5): ext4_fill_super:4962: inode #2: comm syz-executor.5: iget: special inode unallocated [ 3249.486296] EXT4-fs (loop5): get root inode failed [ 3249.487201] EXT4-fs (loop5): mount failed 01:20:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:20:18 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:18 executing program 4: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3249.579727] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3249.579727] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.579727] [ 3249.591733] EXT4-fs (loop6): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.592641] EXT4-fs (loop6): group descriptors corrupted! [ 3249.615158] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3249.615158] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.615158] [ 3249.617451] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3249.617451] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3249.617451] [ 3249.617637] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3249.632309] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3249.633727] EXT4-fs (loop4): group descriptors corrupted! 01:20:31 executing program 4: flock(0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:31 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:31 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:20:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x174, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:20:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3261.705158] kauditd_printk_skb: 92 callbacks suppressed [ 3261.705177] audit: type=1326 audit(1713662431.112:23774): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.709471] audit: type=1326 audit(1713662431.112:23775): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.713836] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3261.713836] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3261.713836] [ 3261.717691] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3261.717691] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3261.717691] [ 3261.717971] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3261.720607] audit: type=1326 audit(1713662431.122:23776): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.737183] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3261.740893] audit: type=1326 audit(1713662431.123:23777): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.744945] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3261.744945] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3261.744945] [ 3261.746478] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3261.746478] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3261.746478] [ 3261.747282] blktrace: Concurrent blktraces are not allowed on loop2 [ 3261.749441] audit: type=1326 audit(1713662431.123:23778): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.749539] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3261.754018] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3261.754812] EXT4-fs (loop4): group descriptors corrupted! [ 3261.755012] audit: type=1326 audit(1713662431.131:23779): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.758747] blktrace: Concurrent blktraces are not allowed on loop4 [ 3261.762906] audit: type=1326 audit(1713662431.131:23780): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.771196] audit: type=1326 audit(1713662431.131:23781): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.774902] audit: type=1326 audit(1713662431.133:23782): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.778386] audit: type=1326 audit(1713662431.133:23783): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17216 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3261.817786] EXT4-fs (loop5): invalid first ino: 0 01:20:44 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3274.811855] kauditd_printk_skb: 43 callbacks suppressed [ 3274.811873] audit: type=1326 audit(1713662444.219:23827): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:20:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x17a, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3274.827184] audit: type=1326 audit(1713662444.234:23828): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3274.836710] audit: type=1326 audit(1713662444.240:23829): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3274.844619] blktrace: Concurrent blktraces are not allowed on loop2 [ 3274.846611] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3274.846611] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3274.846611] [ 3274.850322] blktrace: Concurrent blktraces are not allowed on loop4 [ 3274.851909] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3274.851909] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3274.851909] [ 3274.854161] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3274.854161] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3274.854161] [ 3274.858101] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) 01:20:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3274.859565] audit: type=1326 audit(1713662444.240:23830): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3274.861039] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3274.862937] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3274.862937] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3274.862937] [ 3274.871811] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3274.875659] audit: type=1326 audit(1713662444.240:23831): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3274.884990] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3274.886448] EXT4-fs (loop4): group descriptors corrupted! 01:20:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) [ 3274.889847] audit: type=1326 audit(1713662444.241:23832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3274.906551] audit: type=1326 audit(1713662444.241:23833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x300, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3274.936295] audit: type=1326 audit(1713662444.247:23834): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3274.943484] audit: type=1326 audit(1713662444.248:23835): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3274.953733] audit: type=1326 audit(1713662444.248:23836): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17245 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3274.987340] EXT4-fs (loop5): invalid first ino: 0 [ 3274.989648] blktrace: Concurrent blktraces are not allowed on loop2 [ 3275.000874] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3275.000874] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3275.000874] [ 3275.008325] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3275.026463] blktrace: Concurrent blktraces are not allowed on loop4 [ 3275.041063] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3275.041063] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3275.041063] [ 3275.043069] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3275.047278] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3275.047278] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3275.047278] [ 3275.048967] EXT4-fs (loop3): bad geometry: block count 128 exceeds size of device (1 blocks) 01:20:44 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:20:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:44 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3275.168254] blktrace: Concurrent blktraces are not allowed on loop2 [ 3275.173719] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3275.173719] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3275.173719] [ 3275.178050] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3275.243819] EXT4-fs (loop5): invalid first ino: 0 01:20:58 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3289.081305] kauditd_printk_skb: 70 callbacks suppressed [ 3289.081329] audit: type=1326 audit(1713662458.488:23907): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3289.091516] audit: type=1326 audit(1713662458.488:23908): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:20:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x500, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3289.117159] audit: type=1326 audit(1713662458.490:23909): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3289.127196] audit: type=1326 audit(1713662458.490:23910): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3289.128987] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3289.128987] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3289.128987] [ 3289.137891] audit: type=1326 audit(1713662458.490:23911): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3289.146818] audit: type=1326 audit(1713662458.490:23912): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3289.152046] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3289.155735] audit: type=1326 audit(1713662458.490:23913): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3289.163584] audit: type=1326 audit(1713662458.490:23914): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:20:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3289.172568] audit: type=1326 audit(1713662458.490:23915): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3289.178316] audit: type=1326 audit(1713662458.495:23916): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17307 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3289.187226] blktrace: Concurrent blktraces are not allowed on loop4 [ 3289.193919] EXT4-fs (loop5): unsupported inode size: 0 [ 3289.194971] EXT4-fs (loop5): blocksize: 2048 [ 3289.196225] blktrace: Concurrent blktraces are not allowed on loop2 [ 3289.197800] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3289.203152] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3289.203152] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3289.203152] [ 3289.219202] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) 01:20:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:20:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3289.327711] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 01:20:58 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:20:58 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3289.387801] blktrace: Concurrent blktraces are not allowed on loop2 [ 3289.414531] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3289.414531] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3289.414531] [ 3289.417228] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3289.422564] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3289.422564] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3289.422564] [ 3289.429620] EXT4-fs (loop7): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3289.431021] EXT4-fs (loop7): group descriptors corrupted! [ 3289.498109] EXT4-fs (loop5): unsupported inode size: 0 [ 3289.499185] EXT4-fs (loop5): blocksize: 2048 01:21:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:11 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:11 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x15) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:21:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xa00, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:21:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:11 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3302.242157] kauditd_printk_skb: 76 callbacks suppressed [ 3302.242175] audit: type=1326 audit(1713662471.649:23993): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.247635] audit: type=1326 audit(1713662471.654:23994): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.253821] audit: type=1326 audit(1713662471.659:23995): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:21:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3302.270898] audit: type=1326 audit(1713662471.659:23996): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.287318] blktrace: Concurrent blktraces are not allowed on loop2 [ 3302.288860] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3302.288860] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3302.288860] [ 3302.297868] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3302.308074] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3302.313476] audit: type=1326 audit(1713662471.660:23997): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.316723] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3302.316723] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3302.316723] 01:21:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3302.339306] audit: type=1326 audit(1713662471.660:23998): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:21:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3302.357244] audit: type=1326 audit(1713662471.666:23999): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.361326] audit: type=1326 audit(1713662471.668:24000): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.364163] audit: type=1326 audit(1713662471.668:24001): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.366534] EXT4-fs error (device loop6): ext4_fill_super:4962: inode #2: comm syz-executor.6: iget: special inode unallocated [ 3302.367542] audit: type=1326 audit(1713662471.668:24002): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17360 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3302.382621] EXT4-fs (loop6): get root inode failed [ 3302.383395] EXT4-fs (loop6): mount failed [ 3302.419113] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3302.440093] EXT4-fs (loop5): unsupported inode size: 0 [ 3302.440582] EXT4-fs (loop5): blocksize: 2048 01:21:25 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x15) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:21:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xb91, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:21:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3316.035013] kauditd_printk_skb: 42 callbacks suppressed [ 3316.035025] audit: type=1326 audit(1713662485.442:24045): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.037656] audit: type=1326 audit(1713662485.443:24046): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.039676] audit: type=1326 audit(1713662485.443:24047): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.042776] audit: type=1326 audit(1713662485.443:24048): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.045707] blktrace: Concurrent blktraces are not allowed on loop2 [ 3316.047875] audit: type=1326 audit(1713662485.445:24049): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.051157] audit: type=1326 audit(1713662485.445:24050): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.054720] audit: type=1326 audit(1713662485.445:24051): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:21:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, 0x0) 01:21:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3316.071994] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3316.071994] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3316.071994] [ 3316.074362] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3316.080500] audit: type=1326 audit(1713662485.445:24052): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.088696] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3316.088696] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3316.088696] [ 3316.091065] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3316.102475] audit: type=1326 audit(1713662485.445:24053): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.117818] audit: type=1326 audit(1713662485.445:24054): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17409 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3316.124068] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3316.136160] EXT4-fs (loop5): unsupported inode size: 0 [ 3316.136777] EXT4-fs (loop5): blocksize: 2048 01:21:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x15) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:21:25 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, 0x0) 01:21:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1400, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:21:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3316.267182] blktrace: Concurrent blktraces are not allowed on loop2 [ 3316.287456] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3316.292533] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3316.292533] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3316.292533] [ 3316.300487] EXT4-fs (loop7): Mount option "noacl" will be removed by 3.5 [ 3316.300487] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3316.300487] [ 3316.313472] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3316.323254] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3316.323254] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3316.323254] [ 3316.326372] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3316.327847] EXT4-fs (loop4): group descriptors corrupted! [ 3316.329059] EXT4-fs (loop7): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3316.396082] blktrace: Concurrent blktraces are not allowed on loop4 [ 3316.471086] EXT4-fs (loop5): unsupported inode size: 0 [ 3316.472091] EXT4-fs (loop5): blocksize: 2048 01:21:38 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x2000, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:21:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, 0x0) 01:21:38 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:21:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3329.275838] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3329.290508] kauditd_printk_skb: 92 callbacks suppressed [ 3329.290527] audit: type=1326 audit(1713662498.697:24147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3329.294829] audit: type=1326 audit(1713662498.698:24148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3329.303930] audit: type=1326 audit(1713662498.698:24149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:21:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)) [ 3329.320985] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3329.333877] audit: type=1326 audit(1713662498.698:24150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3329.339100] blktrace: Concurrent blktraces are not allowed on loop2 [ 3329.343548] EXT4-fs (loop6): Mount option "noacl" will be removed by 3.5 [ 3329.343548] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3329.343548] [ 3329.349600] EXT4-fs (loop6): bad geometry: block count 128 exceeds size of device (8 blocks) [ 3329.353624] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3329.353624] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3329.353624] [ 3329.358483] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3329.359830] EXT4-fs (loop4): group descriptors corrupted! 01:21:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)) [ 3329.380716] audit: type=1326 audit(1713662498.702:24151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:21:38 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3329.416677] audit: type=1326 audit(1713662498.705:24152): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:21:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) [ 3329.429326] audit: type=1326 audit(1713662498.705:24153): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3329.439365] audit: type=1326 audit(1713662498.705:24154): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3329.456531] audit: type=1326 audit(1713662498.706:24155): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3329.462694] blktrace: Concurrent blktraces are not allowed on loop2 01:21:38 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) [ 3329.497314] EXT4-fs (loop5): unsupported inode size: 0 [ 3329.498687] EXT4-fs (loop5): blocksize: 2048 [ 3329.498879] audit: type=1326 audit(1713662498.706:24156): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17457 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3329.525700] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 01:21:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3329.533199] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3329.606248] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3329.617975] blktrace: Concurrent blktraces are not allowed on loop2 01:21:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:21:51 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)) 01:21:51 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x4000, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3342.409225] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3342.419755] kauditd_printk_skb: 31 callbacks suppressed [ 3342.419775] audit: type=1326 audit(1713662511.827:24188): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.428521] audit: type=1326 audit(1713662511.827:24189): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.451167] EXT4-fs (loop5): unsupported inode size: 0 [ 3342.451739] EXT4-fs (loop5): blocksize: 2048 [ 3342.453566] audit: type=1326 audit(1713662511.827:24190): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.455504] audit: type=1326 audit(1713662511.827:24191): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.458708] audit: type=1326 audit(1713662511.827:24192): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.461095] audit: type=1326 audit(1713662511.827:24193): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.464122] audit: type=1326 audit(1713662511.828:24194): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.466836] audit: type=1326 audit(1713662511.828:24195): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.469155] audit: type=1326 audit(1713662511.828:24196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.473808] audit: type=1326 audit(1713662511.828:24197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3342.486830] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3342.503438] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3342.507576] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3342.507576] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3342.507576] [ 3342.510618] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3342.514093] blktrace: Concurrent blktraces are not allowed on loop4 01:21:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:21:51 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:51 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3342.611224] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3342.612971] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3342.633331] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3342.637195] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3342.637195] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3342.637195] [ 3342.641563] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3342.692992] EXT4-fs (loop5): unsupported inode size: 0 [ 3342.693598] EXT4-fs (loop5): blocksize: 2048 [ 3342.701475] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:21:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:21:52 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:21:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3342.743619] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 01:22:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x910b, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:22:05 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:22:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:05 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3355.841171] kauditd_printk_skb: 76 callbacks suppressed [ 3355.841182] audit: type=1326 audit(1713662525.246:24274): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3355.843597] audit: type=1326 audit(1713662525.246:24275): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3355.858237] audit: type=1326 audit(1713662525.265:24276): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:22:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3355.876579] audit: type=1326 audit(1713662525.265:24277): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3355.892731] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3355.892731] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3355.892731] [ 3355.894321] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3355.897654] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3355.898723] audit: type=1326 audit(1713662525.265:24278): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3355.910231] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) [ 3355.912152] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3355.916112] audit: type=1326 audit(1713662525.269:24279): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3355.925852] blktrace: Concurrent blktraces are not allowed on loop2 [ 3355.927973] blktrace: Concurrent blktraces are not allowed on loop4 [ 3355.944048] audit: type=1326 audit(1713662525.269:24281): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17564 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb135be7b19 code=0x7ffc0000 01:22:05 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:05 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:05 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3355.973274] audit: type=1326 audit(1713662525.269:24280): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3355.975165] audit: type=1326 audit(1713662525.270:24282): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3355.977015] audit: type=1326 audit(1713662525.270:24283): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17560 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 01:22:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) [ 3356.010448] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3356.010735] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3356.050557] EXT4-fs (loop5): unsupported inode size: 0 [ 3356.051064] EXT4-fs (loop5): blocksize: 2048 01:22:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3356.074825] blktrace: Concurrent blktraces are not allowed on loop2 [ 3356.126034] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3356.135421] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3356.135421] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3356.135421] [ 3356.144387] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) 01:22:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:22:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0xba00, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 01:22:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 0: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3369.696707] kauditd_printk_skb: 112 callbacks suppressed [ 3369.696724] audit: type=1326 audit(1713662539.103:24396): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.700892] audit: type=1326 audit(1713662539.104:24397): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.705969] blktrace: Concurrent blktraces are not allowed on loop2 [ 3369.712044] audit: type=1326 audit(1713662539.104:24398): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.715023] audit: type=1326 audit(1713662539.104:24399): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.718086] audit: type=1326 audit(1713662539.104:24400): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.723680] audit: type=1326 audit(1713662539.104:24401): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.726214] audit: type=1326 audit(1713662539.105:24402): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.729869] audit: type=1326 audit(1713662539.105:24403): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=284 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.733118] audit: type=1326 audit(1713662539.105:24404): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.736563] audit: type=1326 audit(1713662539.106:24405): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fca55106b19 code=0x7ffc0000 [ 3369.744028] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 01:22:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) [ 3369.764011] blktrace: Concurrent blktraces are not allowed on loop4 [ 3369.767128] EXT4-fs (loop3): Mount option "noacl" will be removed by 3.5 [ 3369.767128] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3369.767128] [ 3369.769019] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3369.769019] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3369.769019] [ 3369.771579] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3369.772491] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3369.788547] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3369.789978] EXT4-fs (loop3): group descriptors corrupted! [ 3369.794485] EXT4-fs (loop4): bad geometry: block count 128 exceeds size of device (1 blocks) 01:22:19 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed", 0x1, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4", 0x2e, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 5: flock(0xffffffffffffffff, 0x8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x9, 0x0, 0x7ffc0000}]}) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x70bd29, 0x0, {{}, {}, {0x4c, 0x18, {0x90b, @media='ib\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040804}, 0x0) eventfd(0x4) io_setup(0x6, &(0x7f00000002c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000), 0xf) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f00000016c0)={0x1, 0x80, 0xff, 0x2, 0xe0, 0x20, 0x0, 0xffff, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfff}, 0x52440, 0x7ca, 0x0, 0x7, 0xfffffffffffff000, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0xb92}, 0x0, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 3369.977750] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 01:22:19 executing program 0: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x910b, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3370.016300] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 01:22:19 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 01:22:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x14c, 0x100, 0xb91, 0x0, 0x9}) 01:22:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0xdd48a83c10608be0, 0x0, 0x0, 0x2, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x15) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x29, 0x77, 0xc3, 0x8001, 0x2, @loopback, @loopback, 0x1, 0x700, 0x2, 0x2}}) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="03000000c1d3f9fba5455dea873cfe000000002e2f66696c65300057b6d84dc870092c61bd6cc19bd10376"]) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x162210, 0xb91, 0x0, 0x9}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 3370.052876] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 3370.083056] EXT4-fs (loop4): Mount option "noacl" will be removed by 3.5 [ 3370.083056] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 3370.083056] [ 3370.126134] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 3370.127473] EXT4-fs (loop4): group descriptors corrupted! [ 3370.135037] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3370.139057] blktrace: Concurrent blktraces are not allowed on loop4 [ 3370.142826] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 3372.325544] syz-executor.2 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 3372.326530] CPU: 1 PID: 283 Comm: syz-executor.2 Not tainted 5.10.215 #1 [ 3372.327068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3372.327723] Call Trace: [ 3372.327964] dump_stack+0x107/0x167 [ 3372.328266] dump_header+0x106/0x655 [ 3372.328577] oom_kill_process.cold+0x10/0x15 [ 3372.328949] out_of_memory+0x1149/0x1440 [ 3372.329277] ? oom_killer_disable+0x280/0x280 [ 3372.329645] ? mutex_trylock+0x237/0x2b0 [ 3372.329970] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 3372.330451] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 3372.330924] ? lock_acquire+0xf7/0x470 [ 3372.331237] ? warn_alloc+0x190/0x190 [ 3372.331556] __alloc_pages_nodemask+0x51d/0x600 [ 3372.331933] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3372.332421] ? find_get_entry+0x2c8/0x740 [ 3372.332760] alloc_pages_current+0x187/0x280 [ 3372.333116] __page_cache_alloc+0x2d2/0x360 [ 3372.333465] pagecache_get_page+0x2c7/0xc80 [ 3372.333813] filemap_fault+0x177d/0x2210 [ 3372.334145] ? read_cache_page_gfp+0x30/0x30 [ 3372.334498] ? replace_page_cache_page+0x1200/0x1200 [ 3372.334904] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 3372.335328] ext4_filemap_fault+0x87/0xc0 [ 3372.335659] __do_fault+0x113/0x410 [ 3372.335955] handle_mm_fault+0x1e53/0x3500 [ 3372.336313] ? __pmd_alloc+0x5e0/0x5e0 [ 3372.336625] ? vmacache_find+0x55/0x2a0 [ 3372.336954] do_user_addr_fault+0x56e/0xc60 [ 3372.337305] exc_page_fault+0xa2/0x1a0 [ 3372.337618] ? asm_exc_page_fault+0x8/0x30 [ 3372.337959] asm_exc_page_fault+0x1e/0x30 [ 3372.338289] RIP: 0033:0x7f4e48800ab5 [ 3372.338593] Code: Unable to access opcode bytes at RIP 0x7f4e48800a8b. [ 3372.339110] RSP: 002b:00007ffd3c2ee9f0 EFLAGS: 00010206 [ 3372.339546] RAX: 0000000000000000 RBX: 0000000000000564 RCX: 00007f4e488258e1 [ 3372.340118] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 3372.340690] RBP: 00007ffd3c2eea7c R08: 0000000000000000 R09: 00007ffd3c316080 [ 3372.341264] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000032 [ 3372.341822] R13: 0000000000336db5 R14: 000000000000000c R15: 00007ffd3c2eeae0 [ 3372.342445] Mem-Info: [ 3372.342654] active_anon:3883 inactive_anon:63109 isolated_anon:0 [ 3372.342654] active_file:22 inactive_file:28 isolated_file:0 [ 3372.342654] unevictable:0 dirty:0 writeback:0 [ 3372.342654] slab_reclaimable:8962 slab_unreclaimable:60045 [ 3372.342654] mapped:69634 shmem:198 pagetables:1513 bounce:0 [ 3372.342654] free:2978 free_pcp:3 free_cma:0 [ 3372.345398] Node 0 active_anon:15532kB inactive_anon:252436kB active_file:88kB inactive_file:196kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278536kB dirty:0kB writeback:0kB shmem:792kB writeback_tmp:0kB kernel_stack:4352kB all_unreclaimable? yes [ 3372.347542] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3372.349910] lowmem_reserve[]: 0 1616 1616 1616 [ 3372.350309] Node 0 DMA32 free:5700kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:15532kB inactive_anon:252436kB active_file:60kB inactive_file:716kB unevictable:0kB writepending:0kB present:2080640kB managed:1660476kB mlocked:0kB pagetables:6052kB bounce:0kB free_pcp:112kB local_pcp:0kB free_cma:0kB [ 3372.352963] lowmem_reserve[]: 0 0 0 0 [ 3372.353357] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 3372.354741] Node 0 DMA32: 28*4kB (UM) 83*8kB (UM) 29*16kB (UME) 55*32kB (UM) 8*64kB (UM) 5*128kB (M) 1*256kB (U) 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 5432kB [ 3372.356077] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3372.356764] 536 total pagecache pages [ 3372.357060] 0 pages in swap cache [ 3372.357332] Swap cache stats: add 0, delete 0, find 0/0 [ 3372.357756] Free swap = 0kB [ 3372.357992] Total swap = 0kB [ 3372.358229] 524158 pages RAM [ 3372.358482] 0 pages HighMem/MovableOnly [ 3372.358789] 105062 pages reserved [ 3372.359061] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=syz2,mems_allowed=0,global_oom,task_memcg=/syz2,task=syz-executor.2,pid=283,uid=0 [ 3372.361057] Out of memory (oom_kill_allocating_task): Killed process 283 (syz-executor.2) total-vm:93280kB, anon-rss:388kB, file-rss:34516kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:0 [ 3372.685145] systemd-journal invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=-250 [ 3372.686021] CPU: 0 PID: 103 Comm: systemd-journal Not tainted 5.10.215 #1 [ 3372.686582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3372.687258] Call Trace: [ 3372.687486] dump_stack+0x107/0x167 [ 3372.687786] dump_header+0x106/0x655 [ 3372.688095] oom_kill_process.cold+0x10/0x15 [ 3372.688468] out_of_memory+0x1149/0x1440 [ 3372.688803] ? oom_killer_disable+0x280/0x280 [ 3372.689175] ? mutex_trylock+0x237/0x2b0 [ 3372.689509] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 3372.689991] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 3372.690475] ? lock_acquire+0xf7/0x470 [ 3372.690793] ? warn_alloc+0x190/0x190 [ 3372.691115] __alloc_pages_nodemask+0x51d/0x600 [ 3372.691501] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3372.691990] ? find_get_entry+0x2c8/0x740 [ 3372.692340] alloc_pages_current+0x187/0x280 [ 3372.692701] __page_cache_alloc+0x2d2/0x360 [ 3372.693055] pagecache_get_page+0x2c7/0xc80 [ 3372.693412] filemap_fault+0x177d/0x2210 [ 3372.693753] ? read_cache_page_gfp+0x30/0x30 [ 3372.694115] ? replace_page_cache_page+0x1200/0x1200 [ 3372.694531] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 3372.694965] ext4_filemap_fault+0x87/0xc0 [ 3372.695306] __do_fault+0x113/0x410 [ 3372.695613] handle_mm_fault+0x1e53/0x3500 [ 3372.695958] ? find_held_lock+0x2c/0x110 [ 3372.696301] ? __pmd_alloc+0x5e0/0x5e0 [ 3372.696623] ? vmacache_find+0x55/0x2a0 [ 3372.696955] do_user_addr_fault+0x56e/0xc60 [ 3372.697312] exc_page_fault+0xa2/0x1a0 [ 3372.697632] ? asm_exc_page_fault+0x8/0x30 [ 3372.697977] asm_exc_page_fault+0x1e/0x30 [ 3372.698316] RIP: 0033:0x7f9776771700 [ 3372.698628] Code: Unable to access opcode bytes at RIP 0x7f97767716d6. [ 3372.699157] RSP: 002b:00007ffcda0389b8 EFLAGS: 00010246 [ 3372.699593] RAX: 0000561616604f12 RBX: 0000561616604f13 RCX: 0000000000000001 [ 3372.700171] RDX: 0000000000000034 RSI: 0000000000000025 RDI: 0000561616604f13 [ 3372.700755] RBP: 00007ffcda038f10 R08: 0000000000000000 R09: 000000000000000a [ 3372.701332] R10: 00007ffcda038ed7 R11: 0000000000000000 R12: 00007ffcda038f20 [ 3372.701913] R13: 0000561616604f08 R14: 00007ffcda039060 R15: 0000000000000069 [ 3372.702534] Mem-Info: [ 3372.702750] active_anon:3883 inactive_anon:63099 isolated_anon:0 [ 3372.702750] active_file:23 inactive_file:23 isolated_file:0 [ 3372.702750] unevictable:0 dirty:0 writeback:0 [ 3372.702750] slab_reclaimable:8962 slab_unreclaimable:59737 [ 3372.702750] mapped:69641 shmem:198 pagetables:1486 bounce:0 [ 3372.702750] free:2865 free_pcp:62 free_cma:0 [ 3372.705280] Node 0 active_anon:15532kB inactive_anon:252396kB active_file:92kB inactive_file:92kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278564kB dirty:0kB writeback:0kB shmem:792kB writeback_tmp:0kB kernel_stack:4352kB all_unreclaimable? yes [ 3372.707115] Node 0 DMA free:6508kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3372.709192] lowmem_reserve[]: 0 1616 1616 1616 [ 3372.709597] Node 0 DMA32 free:4952kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:15532kB inactive_anon:252396kB active_file:112kB inactive_file:0kB unevictable:0kB writepending:0kB present:2080640kB managed:1660476kB mlocked:0kB pagetables:5944kB bounce:0kB free_pcp:248kB local_pcp:248kB free_cma:0kB [ 3372.711872] lowmem_reserve[]: 0 0 0 0 [ 3372.712204] Node 0 DMA: 1*4kB (U) 1*8kB (U) 0*16kB 1*32kB (U) 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6508kB [ 3372.713353] Node 0 DMA32: 340*4kB (UM) 55*8kB (UM) 29*16kB (UME) 14*32kB (M) 7*64kB (M) 6*128kB (UM) 0*256kB 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 4952kB [ 3372.714573] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3372.715243] 262 total pagecache pages [ 3372.715564] 0 pages in swap cache [ 3372.715842] Swap cache stats: add 0, delete 0, find 0/0 [ 3372.716269] Free swap = 0kB [ 3372.716538] Total swap = 0kB [ 3372.716783] 524158 pages RAM [ 3372.717024] 0 pages HighMem/MovableOnly [ 3372.717359] 105062 pages reserved [ 3372.717637] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/systemd-journald.service,task=systemd-journal,pid=103,uid=0 [ 3372.719478] Out of memory (oom_kill_allocating_task): Killed process 103 (systemd-journal) total-vm:89260kB, anon-rss:880kB, file-rss:0kB, shmem-rss:4kB, UID:0 pgtables:188kB oom_score_adj:-250 [ 3372.734868] in:imklog invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 3372.735659] CPU: 0 PID: 176 Comm: in:imklog Not tainted 5.10.215 #1 [ 3372.736156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3372.736824] Call Trace: [ 3372.737035] dump_stack+0x107/0x167 [ 3372.737323] dump_header+0x106/0x655 [ 3372.737625] oom_kill_process.cold+0x10/0x15 [ 3372.737978] out_of_memory+0x1149/0x1440 [ 3372.738311] ? oom_killer_disable+0x280/0x280 [ 3372.738671] ? mutex_trylock+0x237/0x2b0 [ 3372.738998] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 3372.739477] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 3372.739951] ? lock_acquire+0xf7/0x470 [ 3372.740271] ? warn_alloc+0x190/0x190 [ 3372.740596] __alloc_pages_nodemask+0x51d/0x600 [ 3372.740971] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3372.741456] ? find_get_entry+0x2c8/0x740 [ 3372.741793] alloc_pages_current+0x187/0x280 [ 3372.742150] __page_cache_alloc+0x2d2/0x360 [ 3372.742499] pagecache_get_page+0x2c7/0xc80 [ 3372.742848] filemap_fault+0x177d/0x2210 [ 3372.743179] ? read_cache_page_gfp+0x30/0x30 [ 3372.743535] ? replace_page_cache_page+0x1200/0x1200 [ 3372.743941] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 3372.744370] ext4_filemap_fault+0x87/0xc0 [ 3372.744704] __do_fault+0x113/0x410 [ 3372.744997] handle_mm_fault+0x1e53/0x3500 [ 3372.745341] ? fsnotify+0xf50/0xf50 [ 3372.745635] ? __pmd_alloc+0x5e0/0x5e0 [ 3372.745950] ? vmacache_find+0x55/0x2a0 [ 3372.746272] do_user_addr_fault+0x56e/0xc60 [ 3372.746624] exc_page_fault+0xa2/0x1a0 [ 3372.746936] ? asm_exc_page_fault+0x8/0x30 [ 3372.747273] asm_exc_page_fault+0x1e/0x30 [ 3372.747605] RIP: 0033:0x7fbca7c5a08c [ 3372.747904] Code: Unable to access opcode bytes at RIP 0x7fbca7c5a062. [ 3372.748432] RSP: 002b:00007fbca71f64d0 EFLAGS: 00010246 [ 3372.748857] RAX: 0000000000001389 RBX: 0000000000000000 RCX: 00007fbca7c5a08c [ 3372.749423] RDX: 0000000000001fa0 RSI: 00007fbca71f6d00 RDI: 0000000000000005 [ 3372.749990] RBP: 000055b8300d64c0 R08: 0000000000000000 R09: 000055b8300d2e88 [ 3372.750556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbca71f6d00 [ 3372.751122] R13: 0000000000001fa0 R14: 00007fbca71f6d00 R15: 00007fbca71f6dc8 [ 3372.751716] Mem-Info: [ 3372.751926] active_anon:3883 inactive_anon:63099 isolated_anon:0 [ 3372.751926] active_file:23 inactive_file:23 isolated_file:0 [ 3372.751926] unevictable:0 dirty:0 writeback:0 [ 3372.751926] slab_reclaimable:8962 slab_unreclaimable:59737 [ 3372.751926] mapped:69641 shmem:198 pagetables:1486 bounce:0 [ 3372.751926] free:2482 free_pcp:186 free_cma:0 [ 3372.754416] Node 0 active_anon:15532kB inactive_anon:252396kB active_file:92kB inactive_file:92kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278564kB dirty:0kB writeback:0kB shmem:792kB writeback_tmp:0kB kernel_stack:4352kB all_unreclaimable? yes [ 3372.756253] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3372.758327] lowmem_reserve[]: 0 1616 1616 1616 [ 3372.758730] Node 0 DMA32 free:3440kB min:7164kB low:8816kB high:10468kB reserved_highatomic:0KB active_anon:15532kB inactive_anon:252396kB active_file:112kB inactive_file:136kB unevictable:0kB writepending:0kB present:2080640kB managed:1660476kB mlocked:0kB pagetables:5944kB bounce:0kB free_pcp:744kB local_pcp:496kB free_cma:0kB [ 3372.761024] lowmem_reserve[]: 0 0 0 0 [ 3372.761364] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 3372.762468] Node 0 DMA32: 256*4kB (UM) 54*8kB (UM) 28*16kB (UME) 14*32kB (UM) 7*64kB (UM) 5*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 3440kB [ 3372.763664] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3372.764363] 262 total pagecache pages [ 3372.764670] 0 pages in swap cache [ 3372.764947] Swap cache stats: add 0, delete 0, find 0/0 [ 3372.765391] Free swap = 0kB [ 3372.765634] Total swap = 0kB [ 3372.765873] 524158 pages RAM [ 3372.766109] 0 pages HighMem/MovableOnly [ 3372.766433] 105062 pages reserved [ 3372.766711] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/rsyslog.service,task=in:imklog,pid=176,uid=0 [ 3372.768121] Out of memory (oom_kill_allocating_task): Killed process 174 (rsyslogd) total-vm:220876kB, anon-rss:984kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 3372.931055] in:imklog: page allocation failure: order:0, mode:0x100cca(GFP_HIGHUSER_MOVABLE), nodemask=(null),cpuset=/,mems_allowed=0 [ 3372.932266] CPU: 0 PID: 176 Comm: in:imklog Not tainted 5.10.215 #1 [ 3372.932781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3372.933445] Call Trace: [ 3372.933665] dump_stack+0x107/0x167 [ 3372.933967] warn_alloc.cold+0x95/0x18a [ 3372.934290] ? zone_watermark_ok_safe+0x260/0x260 [ 3372.934683] ? queue_oom_reaper+0x86/0x1e0 [ 3372.935031] ? wait_for_completion_io+0x270/0x270 [ 3372.935428] __alloc_pages_slowpath.constprop.0+0x1c33/0x2170 [ 3372.935901] ? lock_acquire+0xf7/0x470 [ 3372.936218] ? warn_alloc+0x190/0x190 [ 3372.936565] __alloc_pages_nodemask+0x51d/0x600 [ 3372.936938] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3372.937420] ? find_get_entry+0x2c8/0x740 [ 3372.937760] alloc_pages_current+0x187/0x280 [ 3372.938117] __page_cache_alloc+0x2d2/0x360 [ 3372.938471] pagecache_get_page+0x2c7/0xc80 [ 3372.938853] filemap_fault+0x177d/0x2210 [ 3372.939195] ? read_cache_page_gfp+0x30/0x30 [ 3372.939466] syz-fuzzer invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 3372.939555] ? replace_page_cache_page+0x1200/0x1200 [ 3372.940757] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 3372.941184] ext4_filemap_fault+0x87/0xc0 [ 3372.941516] __do_fault+0x113/0x410 [ 3372.941812] handle_mm_fault+0x1e53/0x3500 [ 3372.942166] ? fsnotify+0xf50/0xf50 [ 3372.942465] ? __pmd_alloc+0x5e0/0x5e0 [ 3372.942781] ? vmacache_find+0x55/0x2a0 [ 3372.943103] do_user_addr_fault+0x56e/0xc60 [ 3372.943452] exc_page_fault+0xa2/0x1a0 [ 3372.943768] ? asm_exc_page_fault+0x8/0x30 [ 3372.944110] asm_exc_page_fault+0x1e/0x30 [ 3372.944450] RIP: 0033:0x7fbca7c5a08c [ 3372.944749] Code: Unable to access opcode bytes at RIP 0x7fbca7c5a062. [ 3372.945263] RSP: 002b:00007fbca71f64d0 EFLAGS: 00010246 [ 3372.945692] RAX: 0000000000001389 RBX: 0000000000000000 RCX: 00007fbca7c5a08c [ 3372.946256] RDX: 0000000000001fa0 RSI: 00007fbca71f6d00 RDI: 0000000000000005 [ 3372.946821] RBP: 000055b8300d64c0 R08: 0000000000000000 R09: 000055b8300d2e88 [ 3372.947382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbca71f6d00 [ 3372.947951] R13: 0000000000001fa0 R14: 00007fbca71f6d00 R15: 00007fbca71f6dc8 [ 3372.948547] CPU: 1 PID: 254 Comm: syz-fuzzer Not tainted 5.10.215 #1 [ 3372.948608] Mem-Info: [ 3372.949057] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3372.949065] Call Trace: [ 3372.949274] active_anon:3883 inactive_anon:62889 isolated_anon:0 [ 3372.949274] active_file:18 inactive_file:20 isolated_file:0 [ 3372.949274] unevictable:0 dirty:0 writeback:0 [ 3372.949274] slab_reclaimable:8962 slab_unreclaimable:59523 [ 3372.949274] mapped:69641 shmem:198 pagetables:1455 bounce:0 [ 3372.949274] free:2257 free_pcp:391 free_cma:0 [ 3372.949911] dump_stack+0x107/0x167 [ 3372.949925] dump_header+0x106/0x655 [ 3372.950139] Node 0 active_anon:15532kB inactive_anon:251556kB active_file:72kB inactive_file:80kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278564kB dirty:0kB writeback:0kB shmem:792kB writeback_tmp:0kB kernel_stack:4224kB all_unreclaimable? yes [ 3372.952586] oom_kill_process.cold+0x10/0x15 [ 3372.952601] out_of_memory+0x1149/0x1440 [ 3372.952883] Node 0 [ 3372.953178] ? oom_killer_disable+0x280/0x280 [ 3372.955009] DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3372.955332] ? mutex_trylock+0x237/0x2b0 [ 3372.955661] lowmem_reserve[]: [ 3372.955829] ? __alloc_pages_slowpath.constprop.0+0xa72/0x2170 [ 3372.955843] __alloc_pages_slowpath.constprop.0+0x1b63/0x2170 [ 3372.956188] 0 1616 [ 3372.958217] ? lock_acquire+0xf7/0x470 [ 3372.958230] ? warn_alloc+0x190/0x190 [ 3372.958554] 1616 [ 3372.958804] __alloc_pages_nodemask+0x51d/0x600 [ 3372.959251] 1616 [ 3372.959711] ? __alloc_pages_slowpath.constprop.0+0x2170/0x2170 [ 3372.959725] ? find_get_entry+0x2c8/0x740 [ 3372.959896] Node 0 [ 3372.960209] alloc_pages_current+0x187/0x280 [ 3372.960530] DMA32 free:2540kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:15532kB inactive_anon:251556kB active_file:108kB inactive_file:136kB unevictable:0kB writepending:0kB present:2080640kB managed:1660476kB mlocked:0kB pagetables:5820kB bounce:0kB free_pcp:1564kB local_pcp:1312kB free_cma:0kB [ 3372.960674] __page_cache_alloc+0x2d2/0x360 [ 3372.961028] lowmem_reserve[]: 0 [ 3372.961206] pagecache_get_page+0x2c7/0xc80 [ 3372.961684] 0 [ 3372.962003] filemap_fault+0x177d/0x2210 [ 3372.962171] 0 0 [ 3372.962529] ? read_cache_page_gfp+0x30/0x30 [ 3372.962542] ? replace_page_cache_page+0x1200/0x1200 [ 3372.964740] [ 3372.965077] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 3372.965093] ext4_filemap_fault+0x87/0xc0 [ 3372.965351] Node 0 [ 3372.965689] __do_fault+0x113/0x410 [ 3372.965829] DMA: 0*4kB [ 3372.966162] handle_mm_fault+0x1e53/0x3500 [ 3372.966313] 1*8kB (U) [ 3372.966680] ? _copy_from_user+0xfb/0x1b0 [ 3372.966693] ? __pmd_alloc+0x5e0/0x5e0 [ 3372.967082] 1*16kB (U) [ 3372.967231] ? vmacache_find+0x55/0x2a0 [ 3372.967643] 0*32kB [ 3372.967969] do_user_addr_fault+0x56e/0xc60 [ 3372.968140] 1*64kB (U) [ 3372.968448] exc_page_fault+0xa2/0x1a0 [ 3372.968460] ? asm_exc_page_fault+0x8/0x30 [ 3372.968662] 0*128kB 1*256kB [ 3372.969010] asm_exc_page_fault+0x1e/0x30 [ 3372.969205] (U) 0*512kB [ 3372.969540] RIP: 0033:0x466533 [ 3372.969550] Code: Unable to access opcode bytes at RIP 0x466509. [ 3372.969559] RSP: 002b:000000c00003fe80 EFLAGS: 00010206 [ 3372.969861] 0*1024kB 1*2048kB [ 3372.970075] [ 3372.970086] RAX: ffffffffffffff92 RBX: 000000003b33b07e RCX: 0000000000466533 [ 3372.970405] (M) [ 3372.970574] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000001f20e78 [ 3372.970585] RBP: 000000c00003fec8 R08: 0000000000000000 R09: 0000000000000000 [ 3372.970923] 1*4096kB (M) [ 3372.971134] R10: 000000c00003feb8 R11: 0000000000000206 R12: 0000000000438880 [ 3372.971143] R13: 0000000000000000 R14: 0000000000e5de2c R15: 0000000000000000 [ 3372.971460] = 6488kB [ 3372.971826] Mem-Info: [ 3372.972022] Node 0 DMA32: [ 3372.972391] active_anon:3883 inactive_anon:62889 isolated_anon:0 [ 3372.972391] active_file:18 inactive_file:20 isolated_file:0 [ 3372.972391] unevictable:0 dirty:0 writeback:0 [ 3372.972391] slab_reclaimable:8962 slab_unreclaimable:59523 [ 3372.972391] mapped:69641 shmem:198 pagetables:1455 bounce:0 [ 3372.972391] free:2257 free_pcp:391 free_cma:0 [ 3372.972410] Node 0 active_anon:15532kB inactive_anon:251556kB active_file:72kB inactive_file:80kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278564kB dirty:0kB writeback:0kB shmem:792kB writeback_tmp:0kB kernel_stack:4224kB all_unreclaimable? yes [ 3372.972615] 267*4kB [ 3372.972865] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3372.973368] (M) [ 3372.973789] lowmem_reserve[]: 0 [ 3372.974049] 34*8kB (UM) [ 3372.974187] 1616 1616 [ 3372.974783] 18*16kB [ 3372.974939] 1616 [ 3372.975529] (UME) [ 3372.976099] Node 0 [ 3372.976324] 8*32kB (UM) [ 3372.976916] DMA32 free:2540kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:15532kB inactive_anon:251556kB active_file:108kB inactive_file:136kB unevictable:0kB writepending:0kB present:2080640kB managed:1660476kB mlocked:0kB pagetables:5820kB bounce:0kB free_pcp:1564kB local_pcp:252kB free_cma:0kB [ 3372.977469] 4*64kB [ 3372.977645] lowmem_reserve[]: 0 [ 3372.977842] (M) 5*128kB [ 3372.978067] 0 0 [ 3372.980552] (UM) [ 3372.982345] 0 [ 3372.982535] 0*256kB 0*512kB [ 3372.984563] Node 0 DMA: [ 3372.984727] 0*1024kB 0*2048kB [ 3372.984994] 0*4kB [ 3372.985204] 0*4096kB = 2780kB [ 3372.985419] 1*8kB (U) [ 3372.985617] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3372.985773] 1*16kB (U) [ 3372.985949] 261 total pagecache pages [ 3372.985956] 0 pages in swap cache [ 3372.986132] 0*32kB 1*64kB [ 3372.986368] Swap cache stats: add 0, delete 0, find 0/0 [ 3372.988545] (U) 0*128kB [ 3372.988730] Free swap = 0kB [ 3372.988737] Total swap = 0kB [ 3372.988992] 1*256kB (U) [ 3372.989210] 524158 pages RAM [ 3372.989217] 0 pages HighMem/MovableOnly [ 3372.989383] 0*512kB 0*1024kB [ 3372.989553] 105062 pages reserved [ 3372.995091] 1*2048kB (M) 1*4096kB (M) = 6488kB [ 3372.995480] Node 0 DMA32: 478*4kB (UM) 64*8kB (UM) 25*16kB (UME) 10*32kB (UM) 4*64kB (M) 5*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4040kB [ 3372.996661] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3372.997317] 242 total pagecache pages [ 3372.997629] 0 pages in swap cache [ 3372.997902] Swap cache stats: add 0, delete 0, find 0/0 [ 3372.998316] Free swap = 0kB [ 3372.998569] Total swap = 0kB [ 3372.998807] 524158 pages RAM [ 3372.999043] 0 pages HighMem/MovableOnly [ 3372.999364] 105062 pages reserved [ 3372.999636] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/ssh.service,task=syz-fuzzer,pid=254,uid=0 [ 3373.000911] Out of memory (oom_kill_allocating_task): Killed process 253 (syz-fuzzer) total-vm:1241536kB, anon-rss:227736kB, file-rss:0kB, shmem-rss:0kB, UID:0 pgtables:912kB oom_score_adj:0 [ 3373.197284] systemd[1]: systemd-journald.service: Main process exited, code=killed, status=9/KILL [ 3373.200333] systemd[1]: systemd-journald.service: Failed with result 'oom-kill'. [ 3373.269994] systemd[1]: systemd-journald.service: Consumed 15.769s CPU time. [ 3373.279144] systemd[1]: rsyslog.service: Main process exited, code=killed, status=9/KILL [ 3373.313220] systemd[1]: rsyslog.service: Failed with result 'oom-kill'. [ 3373.320093] systemd[1]: rsyslog.service: Consumed 2.135s CPU time. [ 3373.337212] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 3373.416980] systemd[1]: Stopping Flush Journal to Persistent Storage... [ 3373.438713] systemd[1]: Starting Load/Save RF Kill Switch Status... [ 3373.454226] systemd[1]: ssh.service: Failed with result 'oom-kill'. [ 3373.455325] systemd[1]: ssh.service: Unit process 247 (sshd) remains running after unit stopped. [ 3373.474706] systemd[1]: ssh.service: Consumed 48min 37.199s CPU time. [ 3373.478134] systemd[1]: rsyslog.service: Scheduled restart job, restart counter is at 1. [ 3373.481704] systemd[1]: Stopped target Bluetooth. [ 3373.482124] systemd[1]: Stopped System Logging Service. [ 3373.482776] systemd[1]: rsyslog.service: Consumed 2.135s CPU time. [ 3373.533813] systemd[1]: Starting System Logging Service... [ 3373.599283] systemd[1]: Started Load/Save RF Kill Switch Status. [ 3373.601356] systemd[1]: ssh.service: Scheduled restart job, restart counter is at 1. [ 3373.606738] systemd[1]: Stopped OpenBSD Secure Shell server. [ 3373.610886] systemd[1]: ssh.service: Consumed 48min 37.226s CPU time. [ 3373.636198] systemd[1]: Starting OpenBSD Secure Shell server... [ 3373.640572] systemd[1]: systemd-journal-flush.service: Succeeded. [ 3373.660233] systemd[1]: Stopped Flush Journal to Persistent Storage. [ 3373.661867] systemd[1]: Started System Logging Service. [ 3373.662887] systemd[1]: Stopped Journal Service. [ 3373.663505] systemd[1]: systemd-journald.service: Consumed 15.769s CPU time. [ 3373.685048] systemd[1]: Starting Journal Service... [ 3373.817993] systemd-journald[17672]: File /var/log/journal/7e681e5076844de4a5cfa8606a84b008/system.journal corrupted or uncleanly shut down, renaming and replacing. [ 3373.825932] systemd[1]: Started OpenBSD Secure Shell server. [ 3373.935006] systemd[1]: Started Journal Service. [ 3374.010867] systemd-journald[17672]: Received client request to flush runtime journal. VM DIAGNOSIS: 01:22:22 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=1ffff11001118f39 RCX=ffffffff81139ba6 RDX=ffff8880088b8000 RSI=ffffffff81136847 RDI=ffff8880083fe8c0 RBP=ffff88800fceb600 RSP=ffff8880088c7848 R8 =0000000000000000 R9 =ffffffff8567470f R10=0000000000000000 R11=0000000000000001 R12=ffff88800fceb600 R13=dffffc0000000000 R14=ffff88800fceb650 R15=0000000000100073 RIP=ffffffff8113684e RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2c388db900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2c37fb1cec CR3=000000000e8a4000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=73722f6563696c732e6d65747379732f XMM01=00656369767265732e676f6c73797372 XMM02=79732f6563696c732e6d65747379732f XMM03=00007f2c39178be00000454e4f4e692d XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000003d3000055e119f94180 XMM06=000000000000038e0000000000000000 XMM07=00000000000000000000000000000000 XMM08=69253d4449504e49414d0073253d5445 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000014 RBX=0000000000000001 RCX=ffffffff8596da00 RDX=dffffc0000000000 RSI=0000000000000000 RDI=1ffffffff0b2db40 RBP=ffff888039827575 RSP=ffff888039827418 R8 =ffffffff8596da05 R9 =ffffffff8596da12 R10=0000000000032042 R11=1ffff11007304e8b R12=ffff888039827588 R13=ffff888039827540 R14=1ffff11007304e8b R15=ffffffff8596da04 RIP=ffffffff811084d9 RFL=00000013 [----A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff6e11b1ec0 CR3=000000000f28e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=756e696c2d34365f3638782f62696c2f XMM01=322e6f732e6c6462696c2f756e672d78 XMM02=00322e6f732e6c6462696c2f756e672d XMM03=78756e696c2d34365f3638782f62696c XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000