7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') r1 = fork() ptrace(0xffffffffffffffff, r1) syz_open_procfs(r1, 0x0) ptrace(0x4207, r1) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:53:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2084, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:53:48 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:53:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xf401, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:53:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1149.159151] FAULT_INJECTION: forcing a failure. [ 1149.159151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1149.162243] CPU: 0 PID: 9970 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1149.163917] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1149.166437] Call Trace: [ 1149.167010] dump_stack+0x107/0x163 [ 1149.167782] should_fail.cold+0x5/0xa [ 1149.168590] _copy_from_user+0x2e/0x1b0 [ 1149.169431] move_addr_to_kernel.part.0+0x31/0x110 [ 1149.170496] __copy_msghdr_from_user+0x3dd/0x4b0 [ 1149.171510] ? __ia32_sys_shutdown+0x70/0x70 [ 1149.172429] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1149.173560] ? __lock_acquire+0xbc2/0x5b20 [ 1149.174616] sendmsg_copy_msghdr+0xa1/0x160 [ 1149.175557] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1149.176498] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1149.177690] ? SOFTIRQ_verbose+0x10/0x10 [ 1149.178867] ? lock_downgrade+0x6d0/0x6d0 [ 1149.179869] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1149.181550] ? SOFTIRQ_verbose+0x10/0x10 [ 1149.182646] ___sys_sendmsg+0xc6/0x170 [ 1149.183762] ? sendmsg_copy_msghdr+0x160/0x160 [ 1149.185064] ? __fget_files+0x228/0x410 [ 1149.186037] ? lock_downgrade+0x6d0/0x6d0 [ 1149.187219] ? find_held_lock+0x2c/0x110 [ 1149.188219] ? __fget_files+0x251/0x410 [ 1149.189355] ? __fget_light+0xea/0x280 [ 1149.190300] __sys_sendmsg+0xe5/0x1b0 [ 1149.191381] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1149.192414] ? rcu_read_lock_any_held+0x69/0x90 [ 1149.193749] ? fput_many+0x2f/0x1a0 [ 1149.194652] ? ksys_write+0x1a5/0x250 [ 1149.195745] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1149.196897] do_syscall_64+0x33/0x40 [ 1149.197952] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1149.199191] RIP: 0033:0x466609 [ 1149.200098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1149.204626] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1149.206800] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1149.208516] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1149.210545] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1149.212221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1149.214140] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1149.261962] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 15:53:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000002}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1149.287504] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:53:48 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') r1 = fork() ptrace(0xffffffffffffffff, r1) syz_open_procfs(r1, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:53:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:53:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:53:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1149.496816] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 15:53:48 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:53:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000003}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:53:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1149.556800] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:53:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2084, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:53:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1149.639376] EXT4-fs warning (device loop6): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1149.685270] 9pnet: Insufficient options for proto=fd 15:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6b88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:54:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000006}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:00 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:54:00 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:00 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:00 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') r1 = fork() ptrace(0xffffffffffffffff, r1) syz_open_procfs(r1, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1161.205519] 9pnet: Insufficient options for proto=fd 15:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1161.235191] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1161.236880] FAULT_INJECTION: forcing a failure. [ 1161.236880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1161.238703] CPU: 0 PID: 10069 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1161.239734] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1161.241421] Call Trace: [ 1161.241820] dump_stack+0x107/0x163 [ 1161.242390] should_fail.cold+0x5/0xa [ 1161.242959] _copy_from_user+0x2e/0x1b0 [ 1161.243531] iovec_from_user+0x139/0x3f0 [ 1161.244140] ? move_addr_to_kernel.part.0+0xc8/0x110 [ 1161.244904] __import_iovec+0x67/0x590 [ 1161.245487] ? __ia32_sys_shutdown+0x70/0x70 [ 1161.246170] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1161.246967] import_iovec+0x83/0xb0 [ 1161.247518] sendmsg_copy_msghdr+0x12d/0x160 [ 1161.248180] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1161.248868] ? SOFTIRQ_verbose+0x10/0x10 [ 1161.249481] ? lock_downgrade+0x6d0/0x6d0 [ 1161.250103] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1161.250893] ? SOFTIRQ_verbose+0x10/0x10 [ 1161.251504] ___sys_sendmsg+0xc6/0x170 [ 1161.252086] ? sendmsg_copy_msghdr+0x160/0x160 [ 1161.252772] ? __fget_files+0x228/0x410 [ 1161.253371] ? lock_downgrade+0x6d0/0x6d0 [ 1161.253981] ? find_held_lock+0x2c/0x110 [ 1161.254626] ? __fget_files+0x251/0x410 [ 1161.255236] ? __fget_light+0xea/0x280 [ 1161.255828] __sys_sendmsg+0xe5/0x1b0 [ 1161.256402] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1161.257056] ? rcu_read_lock_any_held+0x69/0x90 [ 1161.257767] ? fput_many+0x2f/0x1a0 [ 1161.258337] ? ksys_write+0x1a5/0x250 [ 1161.258930] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1161.259671] do_syscall_64+0x33/0x40 [ 1161.260207] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1161.260984] RIP: 0033:0x466609 [ 1161.261449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.264248] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1161.265392] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1161.266480] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1161.267551] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.268614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1161.269600] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:54:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:00 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') r1 = fork() ptrace(0xffffffffffffffff, r1) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1161.289348] EXT4-fs (loop6): unsupported descriptor size 0 15:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6c88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:54:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000008}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:00 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:00 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:00 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1161.447223] 9pnet: Insufficient options for proto=fd 15:54:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1161.514929] FAULT_INJECTION: forcing a failure. [ 1161.514929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1161.516722] CPU: 0 PID: 10102 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1161.517785] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1161.519499] Call Trace: [ 1161.519879] dump_stack+0x107/0x163 [ 1161.520401] should_fail.cold+0x5/0xa [ 1161.520976] _copy_from_user+0x2e/0x1b0 [ 1161.521608] ____sys_sendmsg+0x194/0x870 [ 1161.522245] ? kernel_sendmsg+0x50/0x50 [ 1161.522849] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1161.523548] ? SOFTIRQ_verbose+0x10/0x10 [ 1161.524165] ? lock_downgrade+0x6d0/0x6d0 [ 1161.524792] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1161.525584] ? SOFTIRQ_verbose+0x10/0x10 [ 1161.526151] ___sys_sendmsg+0xf3/0x170 [ 1161.526734] ? sendmsg_copy_msghdr+0x160/0x160 [ 1161.527406] ? __fget_files+0x228/0x410 [ 1161.528004] ? lock_downgrade+0x6d0/0x6d0 [ 1161.528632] ? find_held_lock+0x2c/0x110 [ 1161.529258] ? __fget_files+0x251/0x410 [ 1161.529865] ? __fget_light+0xea/0x280 [ 1161.530485] __sys_sendmsg+0xe5/0x1b0 [ 1161.531067] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1161.531725] ? rcu_read_lock_any_held+0x69/0x90 [ 1161.532447] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1161.533180] do_syscall_64+0x33/0x40 [ 1161.533752] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1161.534546] RIP: 0033:0x466609 [ 1161.535033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.537824] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1161.538987] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1161.540075] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1161.541171] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.542269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1161.543357] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:54:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6d88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1161.588017] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1161.601143] EXT4-fs (loop6): unsupported descriptor size 0 15:54:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6e88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:54:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:12 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') fork() ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:54:12 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a1, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:12 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:54:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000011}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1173.180742] FAULT_INJECTION: forcing a failure. [ 1173.180742] name failslab, interval 1, probability 0, space 0, times 0 [ 1173.182245] CPU: 0 PID: 10137 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1173.183033] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1173.184300] Call Trace: [ 1173.184607] dump_stack+0x107/0x163 [ 1173.185019] should_fail.cold+0x5/0xa [ 1173.185449] ? dst_alloc+0x9e/0x610 [ 1173.185858] should_failslab+0x5/0x10 [ 1173.186285] kmem_cache_alloc+0x5b/0x350 [ 1173.186753] dst_alloc+0x9e/0x610 [ 1173.187150] rt_dst_alloc+0x73/0x430 [ 1173.187568] ip_route_output_key_hash_rcu+0x7ef/0x2330 [ 1173.188159] ip_route_output_key_hash+0x18d/0x300 [ 1173.188697] ? ip_route_output_key_hash_rcu+0x2330/0x2330 [ 1173.189321] ? lock_downgrade+0x6d0/0x6d0 [ 1173.189782] ? ip_cmsg_send+0x358/0x990 [ 1173.190234] ip_route_output_flow+0x23/0x150 [ 1173.190745] raw_sendmsg+0x8d3/0x2890 [ 1173.191176] ? usage_accumulate+0x20/0x100 [ 1173.191639] ? dst_output+0x170/0x170 [ 1173.192065] ? __lock_acquire+0x1666/0x5b20 [ 1173.192552] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1173.193141] ? SOFTIRQ_verbose+0x10/0x10 [ 1173.193576] ? lock_downgrade+0x6d0/0x6d0 [ 1173.194046] ? lock_downgrade+0x6d0/0x6d0 [ 1173.194518] ? selinux_inode_notifysecctx+0x60/0x60 [ 1173.195078] ? find_held_lock+0x2c/0x110 [ 1173.195535] ? dst_output+0x170/0x170 [ 1173.195963] inet_sendmsg+0x115/0x140 [ 1173.196372] ? inet_send_prepare+0x4f0/0x4f0 [ 1173.196866] sock_sendmsg+0x138/0x190 [ 1173.197290] ____sys_sendmsg+0x709/0x870 [ 1173.197745] ? kernel_sendmsg+0x50/0x50 [ 1173.198188] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1173.198722] ? SOFTIRQ_verbose+0x10/0x10 [ 1173.199173] ? lock_downgrade+0x6d0/0x6d0 [ 1173.199635] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1173.200218] ? SOFTIRQ_verbose+0x10/0x10 [ 1173.200672] ___sys_sendmsg+0xf3/0x170 [ 1173.201107] ? sendmsg_copy_msghdr+0x160/0x160 [ 1173.201619] ? __fget_files+0x228/0x410 [ 1173.202061] ? lock_downgrade+0x6d0/0x6d0 [ 1173.202537] ? find_held_lock+0x2c/0x110 [ 1173.202998] ? __fget_files+0x251/0x410 [ 1173.203447] ? __fget_light+0xea/0x280 [ 1173.203885] __sys_sendmsg+0xe5/0x1b0 [ 1173.204313] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1173.204794] ? rcu_read_lock_any_held+0x69/0x90 [ 1173.205479] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1173.206022] do_syscall_64+0x33/0x40 [ 1173.206458] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1173.207031] RIP: 0033:0x466609 [ 1173.207394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1173.209447] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1173.210313] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1173.211126] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1173.211924] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1173.212719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1173.213514] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:54:12 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') fork() ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1173.227573] EXT4-fs (loop6): unsupported descriptor size 0 15:54:12 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1173.251842] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:54:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:54:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000021}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:12 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6f88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1173.424242] FAULT_INJECTION: forcing a failure. [ 1173.424242] name failslab, interval 1, probability 0, space 0, times 0 [ 1173.425716] CPU: 0 PID: 10162 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1173.426581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1173.427883] Call Trace: [ 1173.428192] dump_stack+0x107/0x163 [ 1173.428606] should_fail.cold+0x5/0xa [ 1173.429043] ? create_object.isra.0+0x3a/0xa20 [ 1173.429565] should_failslab+0x5/0x10 [ 1173.430001] kmem_cache_alloc+0x5b/0x350 [ 1173.430500] create_object.isra.0+0x3a/0xa20 [ 1173.431001] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1173.431571] kmem_cache_alloc+0x159/0x350 [ 1173.432050] dst_alloc+0x9e/0x610 [ 1173.432452] rt_dst_alloc+0x73/0x430 [ 1173.432882] ip_route_output_key_hash_rcu+0x7ef/0x2330 [ 1173.433479] ip_route_output_key_hash+0x18d/0x300 [ 1173.434022] ? ip_route_output_key_hash_rcu+0x2330/0x2330 [ 1173.434681] ? lock_downgrade+0x6d0/0x6d0 [ 1173.435161] ? ip_cmsg_send+0x358/0x990 [ 1173.435617] ip_route_output_flow+0x23/0x150 [ 1173.436115] raw_sendmsg+0x8d3/0x2890 [ 1173.436545] ? usage_accumulate+0x20/0x100 [ 1173.437019] ? dst_output+0x170/0x170 [ 1173.437451] ? __lock_acquire+0x1666/0x5b20 [ 1173.437947] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1173.438551] ? SOFTIRQ_verbose+0x10/0x10 [ 1173.439002] ? lock_downgrade+0x6d0/0x6d0 [ 1173.439470] ? lock_downgrade+0x6d0/0x6d0 [ 1173.439942] ? selinux_inode_notifysecctx+0x60/0x60 [ 1173.440500] ? find_held_lock+0x2c/0x110 [ 1173.440969] ? dst_output+0x170/0x170 [ 1173.441394] inet_sendmsg+0x115/0x140 [ 1173.441823] ? inet_send_prepare+0x4f0/0x4f0 [ 1173.442314] sock_sendmsg+0x138/0x190 [ 1173.442763] ____sys_sendmsg+0x709/0x870 [ 1173.443231] ? kernel_sendmsg+0x50/0x50 [ 1173.443690] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1173.444183] ? SOFTIRQ_verbose+0x10/0x10 [ 1173.444655] ? lock_downgrade+0x6d0/0x6d0 [ 1173.445100] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1173.445703] ? SOFTIRQ_verbose+0x10/0x10 [ 1173.446142] ___sys_sendmsg+0xf3/0x170 [ 1173.446599] ? sendmsg_copy_msghdr+0x160/0x160 [ 1173.447095] ? __fget_files+0x228/0x410 [ 1173.447551] ? lock_downgrade+0x6d0/0x6d0 [ 1173.447997] ? find_held_lock+0x2c/0x110 [ 1173.448447] ? __fget_files+0x251/0x410 [ 1173.448880] ? __fget_light+0xea/0x280 [ 1173.449312] __sys_sendmsg+0xe5/0x1b0 [ 1173.449718] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1173.450187] ? rcu_read_lock_any_held+0x69/0x90 [ 1173.450719] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1173.451242] do_syscall_64+0x33/0x40 [ 1173.451643] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1173.452196] RIP: 0033:0x466609 [ 1173.452542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1173.454527] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1173.455351] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1173.456111] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1173.456874] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1173.457638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1173.458411] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 [ 1173.538198] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1173.550935] EXT4-fs (loop6): unsupported descriptor size 0 15:54:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7088, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:54:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:26 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a3, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:26 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:54:26 executing program 1 (fault-call:3 fault-nth:6): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:54:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe00000bb}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1187.292258] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:54:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7188, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:54:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1187.309790] FAULT_INJECTION: forcing a failure. [ 1187.309790] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.311812] CPU: 1 PID: 10206 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1187.312950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1187.314905] Call Trace: [ 1187.315374] dump_stack+0x107/0x163 [ 1187.316010] should_fail.cold+0x5/0xa [ 1187.316663] ? __alloc_skb+0x6d/0x620 [ 1187.317334] should_failslab+0x5/0x10 [ 1187.317991] kmem_cache_alloc_node+0x55/0x370 [ 1187.318757] __alloc_skb+0x6d/0x620 [ 1187.319432] alloc_skb_with_frags+0x92/0x570 [ 1187.320802] ? ip_route_output_key_hash+0x1a4/0x300 [ 1187.322253] ? lock_downgrade+0x6d0/0x6d0 [ 1187.323015] sock_alloc_send_pskb+0x73d/0x8a0 [ 1187.323785] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1187.324606] ? sk_reset_timer+0xc0/0xc0 [ 1187.325270] ? lock_downgrade+0x6d0/0x6d0 [ 1187.325951] ? xfrm_lookup_route+0x65/0x1f0 [ 1187.326693] raw_sendmsg+0x13bd/0x2890 [ 1187.327634] ? usage_accumulate+0x20/0x100 [ 1187.328745] ? dst_output+0x170/0x170 [ 1187.329679] ? __lock_acquire+0x1666/0x5b20 [ 1187.330817] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1187.332088] ? SOFTIRQ_verbose+0x10/0x10 [ 1187.333099] ? lock_downgrade+0x6d0/0x6d0 [ 1187.334224] ? lock_downgrade+0x6d0/0x6d0 [ 1187.335170] ? selinux_inode_notifysecctx+0x60/0x60 [ 1187.336272] ? find_held_lock+0x2c/0x110 [ 1187.337351] ? dst_output+0x170/0x170 [ 1187.338349] inet_sendmsg+0x115/0x140 [ 1187.339255] ? inet_send_prepare+0x4f0/0x4f0 [ 1187.339932] EXT4-fs (loop6): unsupported descriptor size 0 [ 1187.340363] sock_sendmsg+0x138/0x190 [ 1187.340389] ____sys_sendmsg+0x709/0x870 [ 1187.343029] ? kernel_sendmsg+0x50/0x50 [ 1187.343904] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1187.344935] ? SOFTIRQ_verbose+0x10/0x10 [ 1187.345889] ? lock_downgrade+0x6d0/0x6d0 [ 1187.346827] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1187.347966] ? SOFTIRQ_verbose+0x10/0x10 [ 1187.348898] ___sys_sendmsg+0xf3/0x170 [ 1187.349819] ? sendmsg_copy_msghdr+0x160/0x160 [ 1187.351015] ? __fget_files+0x228/0x410 [ 1187.351954] ? lock_downgrade+0x6d0/0x6d0 [ 1187.352907] ? find_held_lock+0x2c/0x110 [ 1187.353804] ? __fget_files+0x251/0x410 [ 1187.354723] ? __fget_light+0xea/0x280 [ 1187.355663] __sys_sendmsg+0xe5/0x1b0 [ 1187.356532] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1187.357772] ? rcu_read_lock_any_held+0x69/0x90 [ 1187.358921] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1187.360246] do_syscall_64+0x33/0x40 [ 1187.361325] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1187.362617] RIP: 0033:0x466609 [ 1187.363417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1187.366266] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1187.367720] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1187.368766] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1187.369807] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1187.370862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1187.372030] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:54:26 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:54:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe000bb00}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:54:26 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1187.675477] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1187.719985] EXT4-fs (loop6): unsupported descriptor size 0 15:54:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 15:54:39 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0xf, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7288, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:54:39 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:54:39 executing program 1 (fault-call:3 fault-nth:7): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:39 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:54:39 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) [ 1200.633016] FAULT_INJECTION: forcing a failure. [ 1200.633016] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.635673] CPU: 0 PID: 10266 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1200.636765] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1200.638506] Call Trace: [ 1200.638926] dump_stack+0x107/0x163 [ 1200.639496] should_fail.cold+0x5/0xa [ 1200.640085] ? create_object.isra.0+0x3a/0xa20 [ 1200.640684] should_failslab+0x5/0x10 [ 1200.641266] kmem_cache_alloc+0x5b/0x350 [ 1200.641906] create_object.isra.0+0x3a/0xa20 [ 1200.642447] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1200.643104] kmem_cache_alloc_node+0x169/0x370 [ 1200.643656] __alloc_skb+0x6d/0x620 [ 1200.644086] alloc_skb_with_frags+0x92/0x570 [ 1200.644595] ? ip_route_output_key_hash+0x1a4/0x300 [ 1200.645228] ? lock_downgrade+0x6d0/0x6d0 [ 1200.645735] sock_alloc_send_pskb+0x73d/0x8a0 [ 1200.646251] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1200.646833] ? sk_reset_timer+0xc0/0xc0 [ 1200.647316] ? lock_downgrade+0x6d0/0x6d0 [ 1200.647805] ? xfrm_lookup_route+0x65/0x1f0 [ 1200.648313] raw_sendmsg+0x13bd/0x2890 [ 1200.648780] ? usage_accumulate+0x20/0x100 [ 1200.649304] ? dst_output+0x170/0x170 [ 1200.649762] ? __lock_acquire+0x1666/0x5b20 [ 1200.650269] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1200.650925] ? SOFTIRQ_verbose+0x10/0x10 [ 1200.651439] ? lock_downgrade+0x6d0/0x6d0 [ 1200.651947] ? lock_downgrade+0x6d0/0x6d0 [ 1200.652412] ? selinux_inode_notifysecctx+0x60/0x60 [ 1200.652976] ? find_held_lock+0x2c/0x110 [ 1200.653446] ? dst_output+0x170/0x170 [ 1200.653881] inet_sendmsg+0x115/0x140 [ 1200.654313] ? inet_send_prepare+0x4f0/0x4f0 [ 1200.654831] sock_sendmsg+0x138/0x190 [ 1200.655267] ____sys_sendmsg+0x709/0x870 [ 1200.655729] ? kernel_sendmsg+0x50/0x50 [ 1200.656189] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1200.656721] ? SOFTIRQ_verbose+0x10/0x10 [ 1200.657184] ? lock_downgrade+0x6d0/0x6d0 [ 1200.657641] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1200.658209] ? SOFTIRQ_verbose+0x10/0x10 [ 1200.658681] ___sys_sendmsg+0xf3/0x170 [ 1200.659141] ? sendmsg_copy_msghdr+0x160/0x160 [ 1200.659681] ? __fget_files+0x228/0x410 [ 1200.660111] ? lock_downgrade+0x6d0/0x6d0 [ 1200.660586] ? find_held_lock+0x2c/0x110 [ 1200.661034] ? __fget_files+0x251/0x410 [ 1200.661507] ? __fget_light+0xea/0x280 [ 1200.661931] __sys_sendmsg+0xe5/0x1b0 [ 1200.662379] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1200.662854] ? rcu_read_lock_any_held+0x69/0x90 [ 1200.663378] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1200.663930] do_syscall_64+0x33/0x40 [ 1200.664356] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1200.664934] RIP: 0033:0x466609 [ 1200.665301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1200.667409] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1200.668286] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1200.669098] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1200.669917] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1200.670752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1200.671596] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 [ 1200.683601] EXT4-fs (loop6): unsupported descriptor size 0 [ 1200.687581] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:54:39 executing program 1 (fault-call:3 fault-nth:8): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 1200.830900] FAULT_INJECTION: forcing a failure. [ 1200.830900] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.832737] CPU: 1 PID: 10292 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1200.833830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1200.835600] Call Trace: [ 1200.836068] dump_stack+0x107/0x163 [ 1200.836643] should_fail.cold+0x5/0xa [ 1200.837296] should_failslab+0x5/0x10 [ 1200.837930] __kmalloc_node_track_caller+0x74/0x3f0 [ 1200.838739] ? alloc_skb_with_frags+0x92/0x570 [ 1200.839516] __alloc_skb+0xb1/0x620 [ 1200.840079] alloc_skb_with_frags+0x92/0x570 [ 1200.840834] ? ip_route_output_key_hash+0x1a4/0x300 [ 1200.841607] ? lock_downgrade+0x6d0/0x6d0 [ 1200.842237] sock_alloc_send_pskb+0x73d/0x8a0 [ 1200.842928] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1200.843670] ? sk_reset_timer+0xc0/0xc0 [ 1200.844269] ? lock_downgrade+0x6d0/0x6d0 [ 1200.844889] ? xfrm_lookup_route+0x65/0x1f0 [ 1200.845541] raw_sendmsg+0x13bd/0x2890 [ 1200.846133] ? usage_accumulate+0x20/0x100 [ 1200.846767] ? dst_output+0x170/0x170 [ 1200.847354] ? __lock_acquire+0x1666/0x5b20 [ 1200.848020] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1200.848805] ? SOFTIRQ_verbose+0x10/0x10 [ 1200.849416] ? lock_downgrade+0x6d0/0x6d0 [ 1200.850040] ? lock_downgrade+0x6d0/0x6d0 [ 1200.850683] ? selinux_inode_notifysecctx+0x60/0x60 [ 1200.851460] ? find_held_lock+0x2c/0x110 [ 1200.852089] ? dst_output+0x170/0x170 [ 1200.852667] inet_sendmsg+0x115/0x140 [ 1200.853234] ? inet_send_prepare+0x4f0/0x4f0 [ 1200.853893] sock_sendmsg+0x138/0x190 [ 1200.854465] ____sys_sendmsg+0x709/0x870 [ 1200.855092] ? kernel_sendmsg+0x50/0x50 [ 1200.855686] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1200.856381] ? SOFTIRQ_verbose+0x10/0x10 [ 1200.856983] ? lock_downgrade+0x6d0/0x6d0 [ 1200.857611] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1200.858397] ? SOFTIRQ_verbose+0x10/0x10 [ 1200.859026] ___sys_sendmsg+0xf3/0x170 [ 1200.859742] ? sendmsg_copy_msghdr+0x160/0x160 [ 1200.860434] ? __fget_files+0x228/0x410 [ 1200.861029] ? lock_downgrade+0x6d0/0x6d0 [ 1200.861655] ? find_held_lock+0x2c/0x110 [ 1200.862276] ? __fget_files+0x251/0x410 [ 1200.862886] ? __fget_light+0xea/0x280 [ 1200.863479] __sys_sendmsg+0xe5/0x1b0 [ 1200.864054] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1200.864704] ? rcu_read_lock_any_held+0x69/0x90 [ 1200.865433] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1200.866171] do_syscall_64+0x33/0x40 [ 1200.866728] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1200.867517] RIP: 0033:0x466609 [ 1200.868000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1200.870795] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1200.871949] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1200.873024] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1200.874102] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1200.875191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1200.876271] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:54:51 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:51 executing program 1 (fault-call:3 fault-nth:9): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 15:54:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200000d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:51 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:54:51 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:54:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7388, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1212.551979] FAULT_INJECTION: forcing a failure. [ 1212.551979] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.553727] CPU: 1 PID: 10308 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1212.554752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1212.556459] Call Trace: [ 1212.556860] dump_stack+0x107/0x163 [ 1212.557407] should_fail.cold+0x5/0xa [ 1212.557977] ? create_object.isra.0+0x3a/0xa20 [ 1212.558661] should_failslab+0x5/0x10 [ 1212.559257] kmem_cache_alloc+0x5b/0x350 [ 1212.559884] create_object.isra.0+0x3a/0xa20 [ 1212.560543] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1212.561286] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 1212.562046] ? alloc_skb_with_frags+0x92/0x570 [ 1212.562716] __alloc_skb+0xb1/0x620 [ 1212.563330] alloc_skb_with_frags+0x92/0x570 [ 1212.563983] ? ip_route_output_key_hash+0x1a4/0x300 [ 1212.564723] ? lock_downgrade+0x6d0/0x6d0 [ 1212.565358] sock_alloc_send_pskb+0x73d/0x8a0 [ 1212.566031] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1212.566777] ? sk_reset_timer+0xc0/0xc0 [ 1212.567403] ? lock_downgrade+0x6d0/0x6d0 [ 1212.568028] ? xfrm_lookup_route+0x65/0x1f0 [ 1212.568682] raw_sendmsg+0x13bd/0x2890 [ 1212.569293] ? usage_accumulate+0x20/0x100 [ 1212.569940] ? dst_output+0x170/0x170 [ 1212.570532] ? __lock_acquire+0x1666/0x5b20 [ 1212.571232] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1212.572038] ? SOFTIRQ_verbose+0x10/0x10 [ 1212.572662] ? lock_downgrade+0x6d0/0x6d0 [ 1212.573279] ? lock_downgrade+0x6d0/0x6d0 [ 1212.573941] ? selinux_inode_notifysecctx+0x60/0x60 [ 1212.574684] ? find_held_lock+0x2c/0x110 [ 1212.575356] ? dst_output+0x170/0x170 [ 1212.575922] inet_sendmsg+0x115/0x140 [ 1212.576503] ? inet_send_prepare+0x4f0/0x4f0 [ 1212.577161] sock_sendmsg+0x138/0x190 [ 1212.577760] ____sys_sendmsg+0x709/0x870 [ 1212.578308] ? kernel_sendmsg+0x50/0x50 [ 1212.578897] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1212.579627] ? SOFTIRQ_verbose+0x10/0x10 [ 1212.580254] ? lock_downgrade+0x6d0/0x6d0 [ 1212.580904] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1212.581689] ? SOFTIRQ_verbose+0x10/0x10 [ 1212.582309] ___sys_sendmsg+0xf3/0x170 [ 1212.582891] ? sendmsg_copy_msghdr+0x160/0x160 [ 1212.583629] ? __fget_files+0x228/0x410 [ 1212.584224] ? lock_downgrade+0x6d0/0x6d0 [ 1212.584866] ? find_held_lock+0x2c/0x110 [ 1212.585486] ? __fget_files+0x251/0x410 [ 1212.586109] ? __fget_light+0xea/0x280 [ 1212.586703] __sys_sendmsg+0xe5/0x1b0 [ 1212.587305] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1212.587963] ? rcu_read_lock_any_held+0x69/0x90 [ 1212.588696] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1212.589433] do_syscall_64+0x33/0x40 [ 1212.590006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1212.590792] RIP: 0033:0x466609 [ 1212.591335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1212.594134] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1212.595330] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1212.596437] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1212.597547] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1212.598856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1212.600128] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 [ 1212.627095] EXT4-fs (loop6): unsupported descriptor size 0 15:54:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7488, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1212.675983] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:54:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:51 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:54:52 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:54:52 executing program 1 (fault-call:3 fault-nth:10): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200001d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:54:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1212.827955] 9pnet: Insufficient options for proto=fd 15:54:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:54:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7588, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1212.865028] FAULT_INJECTION: forcing a failure. [ 1212.865028] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.866925] CPU: 0 PID: 10343 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1212.868052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1212.869822] Call Trace: [ 1212.870235] dump_stack+0x107/0x163 [ 1212.870819] should_fail.cold+0x5/0xa [ 1212.871438] ? __skb_ext_alloc+0x19/0x80 [ 1212.872077] should_failslab+0x5/0x10 [ 1212.872675] kmem_cache_alloc+0x5b/0x350 [ 1212.873322] __skb_ext_alloc+0x19/0x80 [ 1212.873938] skb_ext_add+0x504/0x670 [ 1212.874513] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 1212.875316] __alloc_skb+0x3c1/0x620 [ 1212.875897] alloc_skb_with_frags+0x92/0x570 [ 1212.876559] ? ip_route_output_key_hash+0x1a4/0x300 [ 1212.877339] ? lock_downgrade+0x6d0/0x6d0 [ 1212.877988] sock_alloc_send_pskb+0x73d/0x8a0 [ 1212.878666] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1212.879430] ? sk_reset_timer+0xc0/0xc0 [ 1212.880035] ? lock_downgrade+0x6d0/0x6d0 [ 1212.880646] ? xfrm_lookup_route+0x65/0x1f0 [ 1212.881328] raw_sendmsg+0x13bd/0x2890 [ 1212.881949] ? usage_accumulate+0x20/0x100 [ 1212.882618] ? dst_output+0x170/0x170 [ 1212.883227] ? __lock_acquire+0x1666/0x5b20 [ 1212.883921] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1212.884694] ? SOFTIRQ_verbose+0x10/0x10 [ 1212.885329] ? lock_downgrade+0x6d0/0x6d0 [ 1212.885948] ? lock_downgrade+0x6d0/0x6d0 [ 1212.886600] ? selinux_inode_notifysecctx+0x60/0x60 [ 1212.887430] ? find_held_lock+0x2c/0x110 [ 1212.888075] ? dst_output+0x170/0x170 [ 1212.888662] inet_sendmsg+0x115/0x140 [ 1212.889246] ? inet_send_prepare+0x4f0/0x4f0 [ 1212.889923] sock_sendmsg+0x138/0x190 [ 1212.890513] ____sys_sendmsg+0x709/0x870 [ 1212.891152] ? kernel_sendmsg+0x50/0x50 [ 1212.891779] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1212.892489] ? SOFTIRQ_verbose+0x10/0x10 [ 1212.893110] ? lock_downgrade+0x6d0/0x6d0 [ 1212.893751] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1212.894550] ? SOFTIRQ_verbose+0x10/0x10 [ 1212.895203] ___sys_sendmsg+0xf3/0x170 [ 1212.895813] ? sendmsg_copy_msghdr+0x160/0x160 [ 1212.896522] ? __fget_files+0x228/0x410 [ 1212.897134] ? lock_downgrade+0x6d0/0x6d0 [ 1212.897769] ? find_held_lock+0x2c/0x110 [ 1212.898408] ? __fget_files+0x251/0x410 [ 1212.899034] ? __fget_light+0xea/0x280 [ 1212.899638] __sys_sendmsg+0xe5/0x1b0 [ 1212.900222] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1212.900887] ? rcu_read_lock_any_held+0x69/0x90 [ 1212.901622] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1212.902371] do_syscall_64+0x33/0x40 [ 1212.902950] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1212.903747] RIP: 0033:0x466609 [ 1212.904250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1212.907104] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1212.908277] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1212.909375] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1212.910477] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1212.911587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1212.912684] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 [ 1212.918173] EXT4-fs (loop6): unsupported descriptor size 0 [ 1213.034785] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1213.046480] 9pnet: Insufficient options for proto=fd 15:55:05 executing program 1 (fault-call:3 fault-nth:11): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7688, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:55:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88a9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:05 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:55:05 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b02fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88aa, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1226.004351] FAULT_INJECTION: forcing a failure. [ 1226.004351] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.006217] CPU: 0 PID: 10395 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1226.007289] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1226.008931] Call Trace: [ 1226.009322] dump_stack+0x107/0x163 [ 1226.009860] should_fail.cold+0x5/0xa [ 1226.010422] ? create_object.isra.0+0x3a/0xa20 [ 1226.011089] should_failslab+0x5/0x10 [ 1226.011664] kmem_cache_alloc+0x5b/0x350 [ 1226.012273] create_object.isra.0+0x3a/0xa20 [ 1226.012917] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1226.013658] kmem_cache_alloc+0x159/0x350 [ 1226.014272] __skb_ext_alloc+0x19/0x80 [ 1226.014834] skb_ext_add+0x504/0x670 [ 1226.015393] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 1226.016157] __alloc_skb+0x3c1/0x620 [ 1226.016705] alloc_skb_with_frags+0x92/0x570 [ 1226.017338] ? ip_route_output_key_hash+0x1a4/0x300 [ 1226.018069] ? lock_downgrade+0x6d0/0x6d0 [ 1226.018681] sock_alloc_send_pskb+0x73d/0x8a0 [ 1226.019339] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1226.020051] ? sk_reset_timer+0xc0/0xc0 [ 1226.020632] ? lock_downgrade+0x6d0/0x6d0 [ 1226.021236] ? xfrm_lookup_route+0x65/0x1f0 [ 1226.021868] raw_sendmsg+0x13bd/0x2890 [ 1226.022436] ? usage_accumulate+0x20/0x100 [ 1226.023049] ? dst_output+0x170/0x170 [ 1226.023612] ? __lock_acquire+0x1666/0x5b20 [ 1226.024254] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1226.025007] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.025599] ? lock_downgrade+0x6d0/0x6d0 [ 1226.026198] ? lock_downgrade+0x6d0/0x6d0 [ 1226.026809] ? selinux_inode_notifysecctx+0x60/0x60 [ 1226.027535] ? find_held_lock+0x2c/0x110 [ 1226.028151] ? dst_output+0x170/0x170 [ 1226.028707] inet_sendmsg+0x115/0x140 [ 1226.029261] ? inet_send_prepare+0x4f0/0x4f0 [ 1226.029900] sock_sendmsg+0x138/0x190 [ 1226.030454] ____sys_sendmsg+0x709/0x870 [ 1226.031050] ? kernel_sendmsg+0x50/0x50 [ 1226.031639] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1226.032306] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.032896] ? lock_downgrade+0x6d0/0x6d0 [ 1226.033500] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1226.034264] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.034855] ___sys_sendmsg+0xf3/0x170 [ 1226.035429] ? sendmsg_copy_msghdr+0x160/0x160 [ 1226.036091] ? __fget_files+0x228/0x410 [ 1226.036670] ? lock_downgrade+0x6d0/0x6d0 [ 1226.037271] ? find_held_lock+0x2c/0x110 [ 1226.037874] ? __fget_files+0x251/0x410 [ 1226.038455] ? __fget_light+0xea/0x280 [ 1226.039032] __sys_sendmsg+0xe5/0x1b0 [ 1226.039593] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1226.040217] ? rcu_read_lock_any_held+0x69/0x90 [ 1226.040909] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1226.041630] do_syscall_64+0x33/0x40 [ 1226.042171] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1226.042933] RIP: 0033:0x466609 [ 1226.043422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.046076] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1226.047179] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1226.047546] 9pnet: Insufficient options for proto=fd [ 1226.048225] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1226.048234] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.048242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1226.048250] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:55:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b03fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:05 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1226.055594] EXT4-fs (loop6): unsupported descriptor size 0 15:55:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7788, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1226.063350] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:55:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:05 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:05 executing program 1 (fault-call:3 fault-nth:12): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88ab, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1226.242879] 9pnet: Insufficient options for proto=fd 15:55:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:05 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1226.284327] EXT4-fs (loop6): unsupported descriptor size 0 [ 1226.299982] FAULT_INJECTION: forcing a failure. [ 1226.299982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1226.301895] CPU: 0 PID: 10430 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1226.302953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1226.304711] Call Trace: [ 1226.305138] dump_stack+0x107/0x163 [ 1226.305705] should_fail.cold+0x5/0xa [ 1226.306293] _copy_from_iter_full+0x1ff/0x940 [ 1226.306997] ? __check_object_size+0x319/0x440 [ 1226.307719] raw_sendmsg+0x17ee/0x2890 [ 1226.308339] ? dst_output+0x170/0x170 [ 1226.308923] ? __lock_acquire+0x1666/0x5b20 [ 1226.309624] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1226.310426] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.311046] ? lock_downgrade+0x6d0/0x6d0 [ 1226.311675] ? lock_downgrade+0x6d0/0x6d0 [ 1226.312312] ? selinux_inode_notifysecctx+0x60/0x60 [ 1226.313076] ? find_held_lock+0x2c/0x110 [ 1226.313683] ? dst_output+0x170/0x170 [ 1226.314262] inet_sendmsg+0x115/0x140 [ 1226.314811] ? inet_send_prepare+0x4f0/0x4f0 [ 1226.315487] sock_sendmsg+0x138/0x190 [ 1226.316044] ____sys_sendmsg+0x709/0x870 [ 1226.316662] ? kernel_sendmsg+0x50/0x50 [ 1226.317223] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1226.317938] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.318515] ? lock_downgrade+0x6d0/0x6d0 [ 1226.319103] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1226.319902] ? SOFTIRQ_verbose+0x10/0x10 [ 1226.320472] ___sys_sendmsg+0xf3/0x170 [ 1226.321050] ? sendmsg_copy_msghdr+0x160/0x160 [ 1226.321746] ? __fget_files+0x228/0x410 [ 1226.322352] ? lock_downgrade+0x6d0/0x6d0 [ 1226.322947] ? find_held_lock+0x2c/0x110 [ 1226.323579] ? __fget_files+0x251/0x410 [ 1226.324160] ? __fget_light+0xea/0x280 [ 1226.324758] __sys_sendmsg+0xe5/0x1b0 [ 1226.325313] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1226.325982] ? rcu_read_lock_any_held+0x69/0x90 [ 1226.326694] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1226.327467] do_syscall_64+0x33/0x40 [ 1226.328013] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1226.328774] RIP: 0033:0x466609 [ 1226.329254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.331996] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1226.333115] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1226.334180] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1226.335262] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1226.336321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1226.337377] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 [ 1226.351821] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1226.441701] 9pnet: Insufficient options for proto=fd 15:55:16 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace(0x10, r0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:55:16 executing program 1 (fault-call:3 fault-nth:13): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:16 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7888, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:55:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88ac, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1237.443713] FAULT_INJECTION: forcing a failure. [ 1237.443713] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.446134] CPU: 1 PID: 10460 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1237.447253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1237.449196] Call Trace: [ 1237.449748] dump_stack+0x107/0x163 [ 1237.450381] should_fail.cold+0x5/0xa [ 1237.451022] ? lock_release+0x6b0/0x6b0 [ 1237.451681] ? skb_clone+0x14f/0x3c0 [ 1237.452299] should_failslab+0x5/0x10 [ 1237.453017] kmem_cache_alloc+0x5b/0x350 [ 1237.453742] ? find_held_lock+0x2c/0x110 [ 1237.454228] skb_clone+0x14f/0x3c0 [ 1237.454648] dev_queue_xmit_nit+0x3a7/0xad0 [ 1237.455140] dev_hard_start_xmit+0xab/0x840 [ 1237.455650] __dev_queue_xmit+0x17da/0x27d0 [ 1237.456192] ? find_held_lock+0x2c/0x110 [ 1237.456731] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 1237.457287] ? lock_downgrade+0x6d0/0x6d0 [ 1237.457757] ? find_held_lock+0x2c/0x110 [ 1237.458213] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1237.458807] ip_finish_output2+0xe0e/0x2070 [ 1237.459295] ? ip_frag_next+0x9e0/0x9e0 [ 1237.459764] ? nf_hook+0x160/0x4a0 [ 1237.460172] ? __ip_finish_output.part.0+0xb50/0xb50 [ 1237.460752] __ip_finish_output.part.0+0x5e8/0xb50 [ 1237.461320] ? ip_fragment.constprop.0+0x240/0x240 [ 1237.461880] ? raw_sendmsg+0x1e81/0x2890 [ 1237.462345] ? lock_downgrade+0x6d0/0x6d0 [ 1237.462826] ip_output+0x2f3/0x600 [ 1237.463241] raw_sendmsg+0x1b58/0x2890 [ 1237.463716] ? dst_output+0x170/0x170 [ 1237.464146] ? __lock_acquire+0x1666/0x5b20 [ 1237.464635] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1237.465229] ? raw_recvmsg+0x790/0x790 [ 1237.465679] ? selinux_inode_notifysecctx+0x60/0x60 [ 1237.466247] ? find_held_lock+0x2c/0x110 [ 1237.466716] ? dst_output+0x170/0x170 [ 1237.467144] inet_sendmsg+0x115/0x140 [ 1237.467584] ? inet_send_prepare+0x4f0/0x4f0 [ 1237.468082] sock_sendmsg+0x138/0x190 [ 1237.468514] ____sys_sendmsg+0x709/0x870 [ 1237.468989] ? kernel_sendmsg+0x50/0x50 [ 1237.469450] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1237.469963] ? SOFTIRQ_verbose+0x10/0x10 [ 1237.470428] ? lock_downgrade+0x6d0/0x6d0 [ 1237.470895] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1237.471503] ? SOFTIRQ_verbose+0x10/0x10 [ 1237.471968] ___sys_sendmsg+0xf3/0x170 [ 1237.472409] ? sendmsg_copy_msghdr+0x160/0x160 [ 1237.472925] ? __fget_files+0x228/0x410 [ 1237.473374] ? lock_downgrade+0x6d0/0x6d0 [ 1237.473841] ? find_held_lock+0x2c/0x110 [ 1237.474305] ? __fget_files+0x251/0x410 [ 1237.474762] ? __fget_light+0xea/0x280 [ 1237.475208] __sys_sendmsg+0xe5/0x1b0 [ 1237.475648] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1237.476133] ? rcu_read_lock_any_held+0x69/0x90 [ 1237.476681] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1237.477231] do_syscall_64+0x33/0x40 [ 1237.477661] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1237.478249] RIP: 0033:0x466609 [ 1237.478623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.480742] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1237.481620] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1237.482447] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1237.483268] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1237.484090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1237.484894] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:55:16 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1237.509032] 9pnet: Insufficient options for proto=fd [ 1237.518399] EXT4-fs (loop6): unsupported descriptor size 0 15:55:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b08fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1237.568934] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:55:16 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}]}}) 15:55:16 executing program 1 (fault-call:3 fault-nth:14): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88ad, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7988, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:55:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1237.717852] EXT4-fs (loop6): unsupported descriptor size 0 [ 1237.745003] FAULT_INJECTION: forcing a failure. [ 1237.745003] name failslab, interval 1, probability 0, space 0, times 0 [ 1237.746329] CPU: 1 PID: 10499 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1237.747126] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1237.748445] Call Trace: [ 1237.748748] dump_stack+0x107/0x163 [ 1237.749173] should_fail.cold+0x5/0xa [ 1237.749621] ? create_object.isra.0+0x3a/0xa20 [ 1237.750146] should_failslab+0x5/0x10 [ 1237.750590] kmem_cache_alloc+0x5b/0x350 [ 1237.751061] ? lock_acquire+0x197/0x490 [ 1237.751526] create_object.isra.0+0x3a/0xa20 [ 1237.752017] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1237.752598] kmem_cache_alloc+0x159/0x350 [ 1237.753073] skb_clone+0x14f/0x3c0 [ 1237.753493] dev_queue_xmit_nit+0x3a7/0xad0 [ 1237.753994] dev_hard_start_xmit+0xab/0x840 [ 1237.754504] __dev_queue_xmit+0x17da/0x27d0 [ 1237.754996] ? find_held_lock+0x2c/0x110 [ 1237.755486] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 1237.756008] ? lock_downgrade+0x6d0/0x6d0 [ 1237.756485] ? find_held_lock+0x2c/0x110 [ 1237.756956] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1237.757566] ip_finish_output2+0xe0e/0x2070 [ 1237.758066] ? ip_frag_next+0x9e0/0x9e0 [ 1237.758524] ? nf_hook+0x160/0x4a0 [ 1237.758934] ? __ip_finish_output.part.0+0xb50/0xb50 [ 1237.759520] __ip_finish_output.part.0+0x5e8/0xb50 [ 1237.760084] ? ip_fragment.constprop.0+0x240/0x240 [ 1237.760782] ? raw_sendmsg+0x1e81/0x2890 [ 1237.761264] ? lock_downgrade+0x6d0/0x6d0 [ 1237.761805] ip_output+0x2f3/0x600 [ 1237.762234] raw_sendmsg+0x1b58/0x2890 [ 1237.762695] ? dst_output+0x170/0x170 [ 1237.763120] ? __lock_acquire+0x1666/0x5b20 [ 1237.763648] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1237.764252] ? raw_recvmsg+0x790/0x790 [ 1237.764718] ? selinux_inode_notifysecctx+0x60/0x60 [ 1237.765279] ? find_held_lock+0x2c/0x110 [ 1237.765753] ? dst_output+0x170/0x170 [ 1237.766194] inet_sendmsg+0x115/0x140 [ 1237.766637] ? inet_send_prepare+0x4f0/0x4f0 [ 1237.767146] sock_sendmsg+0x138/0x190 [ 1237.767588] ____sys_sendmsg+0x709/0x870 [ 1237.768091] ? kernel_sendmsg+0x50/0x50 [ 1237.768589] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1237.769202] ? SOFTIRQ_verbose+0x10/0x10 [ 1237.769700] ? lock_downgrade+0x6d0/0x6d0 [ 1237.770181] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1237.770782] ? SOFTIRQ_verbose+0x10/0x10 [ 1237.771253] ___sys_sendmsg+0xf3/0x170 [ 1237.771714] ? sendmsg_copy_msghdr+0x160/0x160 [ 1237.772238] ? __fget_files+0x228/0x410 [ 1237.772690] ? lock_downgrade+0x6d0/0x6d0 [ 1237.773176] ? find_held_lock+0x2c/0x110 [ 1237.773703] ? __fget_files+0x251/0x410 [ 1237.774261] ? __fget_light+0xea/0x280 [ 1237.774749] __sys_sendmsg+0xe5/0x1b0 [ 1237.775185] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1237.775697] ? rcu_read_lock_any_held+0x69/0x90 [ 1237.776235] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1237.776800] do_syscall_64+0x33/0x40 [ 1237.777227] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1237.777818] RIP: 0033:0x466609 [ 1237.778203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1237.780493] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1237.781359] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1237.782173] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1237.783065] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1237.784014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1237.784877] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 [ 1237.816591] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:55:28 executing program 1 (fault-call:3 fault-nth:15): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:28 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:55:28 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88ae, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}]}}) 15:55:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7a88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1249.738869] FAULT_INJECTION: forcing a failure. [ 1249.738869] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.739167] EXT4-fs (loop6): unsupported descriptor size 0 [ 1249.740464] CPU: 0 PID: 10529 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1249.742222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1249.743922] Call Trace: [ 1249.744367] dump_stack+0x107/0x163 [ 1249.744921] should_fail.cold+0x5/0xa [ 1249.745501] ? lock_downgrade+0x6d0/0x6d0 [ 1249.746120] ? skb_clone+0x14f/0x3c0 [ 1249.746697] should_failslab+0x5/0x10 [ 1249.747256] kmem_cache_alloc+0x5b/0x350 [ 1249.747888] skb_clone+0x14f/0x3c0 [ 1249.748399] packet_rcv+0xe41/0x1400 [ 1249.748877] ? run_filter+0x470/0x470 [ 1249.749306] dev_queue_xmit_nit+0x38b/0xad0 [ 1249.749843] dev_hard_start_xmit+0xab/0x840 [ 1249.750333] __dev_queue_xmit+0x17da/0x27d0 [ 1249.750873] ? find_held_lock+0x2c/0x110 [ 1249.751333] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 1249.751905] ? lock_downgrade+0x6d0/0x6d0 [ 1249.752392] ? find_held_lock+0x2c/0x110 [ 1249.752872] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1249.753498] ip_finish_output2+0xe0e/0x2070 [ 1249.754010] ? ip_frag_next+0x9e0/0x9e0 [ 1249.754487] ? nf_hook+0x160/0x4a0 [ 1249.754892] ? __ip_finish_output.part.0+0xb50/0xb50 [ 1249.755507] __ip_finish_output.part.0+0x5e8/0xb50 [ 1249.756088] ? ip_fragment.constprop.0+0x240/0x240 [ 1249.756685] ? raw_sendmsg+0x1e81/0x2890 [ 1249.757139] ? lock_downgrade+0x6d0/0x6d0 [ 1249.757660] ip_output+0x2f3/0x600 [ 1249.758063] raw_sendmsg+0x1b58/0x2890 [ 1249.758558] ? dst_output+0x170/0x170 [ 1249.758997] ? __lock_acquire+0x1666/0x5b20 [ 1249.759544] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1249.760159] ? raw_recvmsg+0x790/0x790 [ 1249.760661] ? selinux_inode_notifysecctx+0x60/0x60 [ 1249.761401] ? find_held_lock+0x2c/0x110 [ 1249.762055] ? dst_output+0x170/0x170 [ 1249.762631] inet_sendmsg+0x115/0x140 [ 1249.763201] ? inet_send_prepare+0x4f0/0x4f0 [ 1249.763889] sock_sendmsg+0x138/0x190 [ 1249.764461] ____sys_sendmsg+0x709/0x870 [ 1249.765072] ? kernel_sendmsg+0x50/0x50 [ 1249.765670] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1249.766350] ? SOFTIRQ_verbose+0x10/0x10 [ 1249.766955] ? lock_downgrade+0x6d0/0x6d0 [ 1249.767567] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1249.768245] ? SOFTIRQ_verbose+0x10/0x10 [ 1249.768747] ___sys_sendmsg+0xf3/0x170 [ 1249.769188] ? sendmsg_copy_msghdr+0x160/0x160 [ 1249.769777] ? __fget_files+0x228/0x410 [ 1249.770236] ? lock_downgrade+0x6d0/0x6d0 [ 1249.770763] ? find_held_lock+0x2c/0x110 [ 1249.771260] ? __fget_files+0x251/0x410 [ 1249.771784] ? __fget_light+0xea/0x280 [ 1249.772244] __sys_sendmsg+0xe5/0x1b0 [ 1249.772723] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1249.773231] ? rcu_read_lock_any_held+0x69/0x90 [ 1249.773832] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1249.774400] do_syscall_64+0x33/0x40 [ 1249.774877] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1249.775481] RIP: 0033:0x466609 [ 1249.775934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.778187] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1249.779122] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1249.779983] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1249.780876] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.781763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1249.782661] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 [ 1249.852389] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:55:40 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = fork() ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:55:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7b88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:55:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}]}}) 15:55:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88af, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:40 executing program 1 (fault-call:3 fault-nth:16): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402bbbfa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1261.206349] FAULT_INJECTION: forcing a failure. [ 1261.206349] name failslab, interval 1, probability 0, space 0, times 0 [ 1261.208199] CPU: 1 PID: 10569 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1261.209158] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1261.210881] Call Trace: [ 1261.211308] dump_stack+0x107/0x163 [ 1261.211850] should_fail.cold+0x5/0xa [ 1261.212404] ? create_object.isra.0+0x3a/0xa20 [ 1261.213064] should_failslab+0x5/0x10 [ 1261.213618] kmem_cache_alloc+0x5b/0x350 [ 1261.214204] create_object.isra.0+0x3a/0xa20 [ 1261.214825] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1261.215552] kmem_cache_alloc+0x159/0x350 [ 1261.216160] skb_clone+0x14f/0x3c0 [ 1261.216683] packet_rcv+0xe41/0x1400 [ 1261.217229] ? run_filter+0x470/0x470 [ 1261.217780] dev_queue_xmit_nit+0x38b/0xad0 [ 1261.218448] dev_hard_start_xmit+0xab/0x840 [ 1261.219090] __dev_queue_xmit+0x17da/0x27d0 [ 1261.219754] ? find_held_lock+0x2c/0x110 [ 1261.220351] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 1261.221031] ? lock_downgrade+0x6d0/0x6d0 [ 1261.221653] ? find_held_lock+0x2c/0x110 [ 1261.222244] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1261.223026] ip_finish_output2+0xe0e/0x2070 [ 1261.223671] ? ip_frag_next+0x9e0/0x9e0 [ 1261.224241] ? nf_hook+0x160/0x4a0 [ 1261.224746] ? __ip_finish_output.part.0+0xb50/0xb50 [ 1261.225501] __ip_finish_output.part.0+0x5e8/0xb50 [ 1261.226226] ? ip_fragment.constprop.0+0x240/0x240 [ 1261.226963] ? raw_sendmsg+0x1e81/0x2890 [ 1261.227549] ? lock_downgrade+0x6d0/0x6d0 [ 1261.228530] ip_output+0x2f3/0x600 [ 1261.229312] raw_sendmsg+0x1b58/0x2890 [ 1261.230171] ? dst_output+0x170/0x170 [ 1261.230990] ? __lock_acquire+0x1666/0x5b20 [ 1261.232218] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1261.233463] ? raw_recvmsg+0x790/0x790 [ 1261.234327] ? selinux_inode_notifysecctx+0x60/0x60 [ 1261.235401] ? find_held_lock+0x2c/0x110 [ 1261.236356] ? dst_output+0x170/0x170 [ 1261.237185] inet_sendmsg+0x115/0x140 [ 1261.238007] ? inet_send_prepare+0x4f0/0x4f0 [ 1261.238951] sock_sendmsg+0x138/0x190 [ 1261.239769] ____sys_sendmsg+0x709/0x870 [ 1261.240740] ? kernel_sendmsg+0x50/0x50 [ 1261.241629] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1261.242618] ? SOFTIRQ_verbose+0x10/0x10 [ 1261.243491] ? lock_downgrade+0x6d0/0x6d0 [ 1261.244398] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1261.245519] ? SOFTIRQ_verbose+0x10/0x10 [ 1261.246537] ___sys_sendmsg+0xf3/0x170 [ 1261.247516] ? sendmsg_copy_msghdr+0x160/0x160 [ 1261.248517] ? __fget_files+0x228/0x410 [ 1261.249381] ? lock_downgrade+0x6d0/0x6d0 [ 1261.250277] ? find_held_lock+0x2c/0x110 [ 1261.251170] ? __fget_files+0x251/0x410 [ 1261.252056] ? __fget_light+0xea/0x280 [ 1261.252908] __sys_sendmsg+0xe5/0x1b0 [ 1261.253826] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1261.254887] ? rcu_read_lock_any_held+0x69/0x90 [ 1261.256132] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1261.257281] do_syscall_64+0x33/0x40 [ 1261.258237] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1261.259383] RIP: 0033:0x466609 [ 1261.260164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1261.264682] RSP: 002b:00007f75420a6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1261.266482] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1261.268158] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 1261.269937] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1261.271481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1261.273173] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:55:40 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) ptrace(0x10, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, 0x0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1261.333978] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1261.336899] EXT4-fs (loop6): unsupported descriptor size 0 15:55:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7c88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:55:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa085e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:40 executing program 1 (fault-call:3 fault-nth:17): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:40 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) ptrace(0x10, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, 0x0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1261.574101] FAULT_INJECTION: forcing a failure. [ 1261.574101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1261.575906] CPU: 1 PID: 10616 Comm: syz-executor.1 Not tainted 5.10.56 #1 [ 1261.576928] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1261.578150] Call Trace: [ 1261.578459] dump_stack+0x107/0x163 [ 1261.578877] should_fail.cold+0x5/0xa [ 1261.579326] _copy_to_user+0x2e/0x180 [ 1261.579774] simple_read_from_buffer+0xcc/0x160 [ 1261.580338] proc_fail_nth_read+0x194/0x220 [ 1261.580832] ? proc_sessionid_read+0x220/0x220 [ 1261.581369] ? security_file_permission+0x24e/0x570 [ 1261.581906] ? proc_sessionid_read+0x220/0x220 [ 1261.582443] vfs_read+0x228/0x580 [ 1261.582840] ksys_read+0x12d/0x250 [ 1261.583248] ? __ia32_sys_pwrite64+0x230/0x230 [ 1261.583783] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1261.584350] do_syscall_64+0x33/0x40 [ 1261.584781] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1261.585377] RIP: 0033:0x41935c [ 1261.585746] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1261.587860] RSP: 002b:00007f75420a6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1261.588692] RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 000000000041935c [ 1261.589476] RDX: 000000000000000f RSI: 00007f75420a61e0 RDI: 0000000000000005 [ 1261.590241] RBP: 00007f75420a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 1261.591039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1261.591866] R13: 00007ffd9f3cdccf R14: 00007f75420a6300 R15: 0000000000022000 15:55:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b1, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1261.604319] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 [ 1261.632556] EXT4-fs (loop6): unsupported descriptor size 0 15:55:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7d88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:55:40 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) ptrace(0x10, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, 0x0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:55:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x13}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1261.794232] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:55:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7e88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:55:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x20000018}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:52 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:52 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:55:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:55:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402bbbfa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1273.708085] EXT4-fs (loop6): unsupported descriptor size 0 15:55:53 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:55:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b3, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1273.747028] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 0 15:55:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x7ffff000}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:53 executing program 7: sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x2c, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x78}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4e}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40400d1}, 0x20000801) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:55:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x3, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:55:53 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:55:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7f88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1273.869211] EXT4-fs (loop6): unsupported descriptor size 0 [ 1273.958232] EXT4-fs (loop5): unsupported descriptor size 0 15:56:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8088, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:56:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:04 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:56:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0xfffffdef}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:56:04 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:56:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x4, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1285.669273] EXT4-fs (loop6): unsupported descriptor size 0 [ 1285.671355] EXT4-fs (loop5): unsupported descriptor size 0 15:56:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:05 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:56:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:56:05 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x7, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8188, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:56:05 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1285.912790] EXT4-fs (loop5): unsupported descriptor size 0 [ 1285.914233] EXT4-fs (loop6): unsupported descriptor size 0 15:56:17 executing program 7: r0 = fork() ptrace(0xffffffffffffffff, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:56:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x8, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:56:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x3, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8288, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:56:17 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) [ 1297.972455] EXT4-fs (loop6): unsupported descriptor size 0 [ 1297.987123] EXT4-fs (loop5): unsupported descriptor size 0 15:56:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:56:17 executing program 7: r0 = fork() ptrace(0xffffffffffffffff, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:56:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:17 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:56:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8388, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:56:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x6, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0xa, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:17 executing program 7: r0 = fork() ptrace(0xffffffffffffffff, r0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1298.219787] EXT4-fs (loop5): unsupported descriptor size 0 [ 1298.234876] EXT4-fs (loop6): unsupported descriptor size 0 15:56:29 executing program 7: r0 = fork() ptrace(0x10, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:56:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x8, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:56:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8488, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:56:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:29 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:56:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88b9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1310.550934] EXT4-fs (loop6): unsupported descriptor size 0 [ 1310.551702] EXT4-fs (loop5): unsupported descriptor size 0 15:56:29 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x2, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8588, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:56:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:29 executing program 7: r0 = fork() ptrace(0x10, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1310.797281] EXT4-fs (loop5): unsupported descriptor size 0 15:56:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88ba, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:56:47 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:56:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8688, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:56:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:47 executing program 7: r0 = fork() ptrace(0x10, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:56:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x3, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x11, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:47 executing program 2: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1328.591031] EXT4-fs (loop5): unsupported descriptor size 0 15:56:47 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:56:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8788, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1328.628745] EXT4-fs (loop6): unsupported descriptor size 0 15:56:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:56:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x21, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:56:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88bb, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:56:47 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:56:48 executing program 2: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1328.825596] EXT4-fs (loop5): unsupported descriptor size 0 [ 1328.873176] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:57:00 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:57:00 executing program 2: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88bc, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:00 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886b, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:00 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1341.199714] EXT4-fs (loop5): unsupported descriptor size 0 [ 1341.214222] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:57:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88bd, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:00 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:00 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb00, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:00 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:57:00 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:57:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88be, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1341.440343] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1341.466841] EXT4-fs (loop5): unsupported descriptor size 0 15:57:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88bf, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:15 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:57:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:15 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e", 0x10, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:57:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x80000, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1356.445304] EXT4-fs (loop5): unsupported descriptor size 0 [ 1356.457554] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:57:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0xf, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c1, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:27 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x11, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:27 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:57:27 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:27 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1368.753752] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1368.800321] EXT4-fs (loop5): unsupported descriptor size 0 15:57:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x18, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:28 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:57:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886f, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:28 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:57:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c3, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:28 executing program 2: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x60, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1369.088476] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1369.096933] EXT4-fs (loop5): unsupported descriptor size 0 15:57:28 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x2, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d", 0x18, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:57:28 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1369.344790] EXT4-fs (loop5): unsupported descriptor size 0 [ 1369.344851] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:57:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:57:40 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:40 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:57:40 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1f4, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8870, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:40 executing program 2: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1381.629069] EXT4-fs (loop5): unsupported descriptor size 0 15:57:40 executing program 2: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:40 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1381.698366] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:57:41 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1381.769104] EXT4-fs (loop5): unsupported descriptor size 0 15:57:41 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x4, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:41 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x300, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:41 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f", 0x1c, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:57:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8871, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:41 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1381.901941] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1381.953636] EXT4-fs (loop5): unsupported descriptor size 0 15:57:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8872, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:57:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 15:57:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x3e8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:57:56 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x8, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:57:56 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, 0x0) ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:57:56 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1396.762428] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:57:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88c9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1396.811336] EXT4-fs (loop5): unsupported descriptor size 0 15:57:56 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:57:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa00, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1396.942237] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:58:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe00, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:07 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:07 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, 0x0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:58:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88ca, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:58:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 15:58:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8873, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8874, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1408.404261] EXT4-fs (loop5): unsupported descriptor size 0 [ 1408.415008] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:58:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 15:58:07 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f0100", 0x1e, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:07 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, 0x0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:58:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88cb, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:58:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1100, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8875, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1408.629916] EXT4-fs (loop6): invalid first ino: 0 [ 1408.639248] EXT4-fs (loop5): unsupported descriptor size 0 15:58:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x18, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8876, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:19 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1800, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88cc, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:58:19 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, 0x0, 0x9, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) 15:58:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88cd, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1420.267879] EXT4-fs (loop5): unsupported descriptor size 0 [ 1420.287460] EXT4-fs (loop6): invalid first ino: 0 15:58:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x6000, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:19 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8877, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x60, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:19 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x0, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1420.403749] EXT4-fs (loop6): invalid first ino: 0 [ 1420.493363] EXT4-fs (loop5): unsupported descriptor size 0 15:58:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1f4, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8878, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe803, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88ce, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:58:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:32 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x0, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1432.837699] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 15:58:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88cf, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1432.868061] EXT4-fs (loop5): unsupported descriptor size 0 15:58:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x300, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8879, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xf401, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:32 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x0, &(0x7f00000000c0)={0x14, 0xe132, 0x4}) [ 1432.989430] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1433.038077] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:58:44 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, 0x0) 15:58:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x887a, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:44 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa188, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:58:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:44 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3e8, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000002}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1445.224016] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 15:58:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000003}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1445.243188] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:58:44 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:44 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x887b, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa00, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa288, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:58:44 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, 0x0) [ 1445.375468] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1445.394682] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:58:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa388, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:58:55 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x887c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:58:55 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000006}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe00, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:55 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, 0x0) 15:58:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa488, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1456.677027] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1456.708724] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 15:58:56 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:58:56 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:58:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1100, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:56 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x0, 0xe132, 0x4}) 15:58:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000008}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:58:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x887d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1456.846442] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1456.886874] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:59:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x887e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1800, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa588, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:08 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x0, 0xe132, 0x4}) 15:59:08 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:59:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000011}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x887f, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1468.785674] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1468.795293] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 15:59:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa688, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:08 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x0, 0xe132, 0x4}) 15:59:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x6000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000021}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:08 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) [ 1468.950960] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:59:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa788, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1468.993816] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 15:59:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa888, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:20 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe803, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8880, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:20 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:20 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14, 0x0, 0x4}) 15:59:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe00000bb}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:20 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) [ 1480.756021] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:59:20 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1480.799102] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 15:59:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa988, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8881, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1480.892420] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:59:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe000bb00}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:59:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8882, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xaa88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:32 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14}) 15:59:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xf401, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1492.969173] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1492.976274] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:59:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:59:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0xf, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:32 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14}) 15:59:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8883, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x34000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xab88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1493.091477] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) 15:59:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:32 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) [ 1493.204706] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:59:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xac88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1493.321161] EXT4-fs (loop6): fragment/cluster size (16384) != block size (1024) [ 1493.352089] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:59:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x400300, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8884, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:44 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:44 executing program 7: r0 = fork() ptrace(0x10, r0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f00000002c0)='net\x00') ptrace$setsig(0x4203, r0, 0x9, &(0x7f00000000c0)={0x14}) 15:59:44 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:59:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xad88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200000d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1505.327397] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 1505.346043] EXT4-fs (loop5): invalid first ino: 0 15:59:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xae88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:44 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) [ 1505.546693] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:59:57 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) 15:59:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xaf88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 15:59:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200001d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8885, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe000bb00}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1518.285815] EXT4-fs (loop5): invalid first ino: 0 15:59:57 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:57 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200000d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1518.353904] EXT4-fs (loop6): VFS: Can't find ext4 filesystem 15:59:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8886, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:57 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b02fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x2000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) getdents(r0, 0x0, 0x0) 15:59:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb088, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1518.416371] EXT4-fs (loop5): invalid first ino: 0 15:59:57 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 15:59:57 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1100, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 15:59:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8887, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 15:59:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb188, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1518.593552] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:00:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8888, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:12 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b03fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x4000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:12 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:00:12 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:00:12 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8870, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb288, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:00:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:12 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x8000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1533.703854] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:00:13 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) getdents(r0, 0x0, 0x0) 16:00:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb388, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:00:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(0xffffffffffffffff, 0x0, 0x0) 16:00:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b08fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:00:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8889, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:24 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1545.306505] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 16:00:24 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1545.311828] ext4 filesystem being mounted at /syzkaller-testdir258166516/syzkaller.YCUGI9/214/file0 supports timestamps until 2038 (0x7fffffff) [ 1545.322565] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:00:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x888a, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(0xffffffffffffffff, 0x0, 0x0) 16:00:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:00:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb488, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:00:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x11, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x11000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb588, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1545.527230] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:00:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1545.589963] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1545.591650] ext4 filesystem being mounted at /syzkaller-testdir258166516/syzkaller.YCUGI9/215/file0 supports timestamps until 2038 (0x7fffffff) 16:00:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:24 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(0xffffffffffffffff, 0x0, 0x0) 16:00:25 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1545.819687] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1545.909115] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1545.910429] ext4 filesystem being mounted at /syzkaller-testdir258166516/syzkaller.YCUGI9/216/file0 supports timestamps until 2038 (0x7fffffff) 16:00:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x888b, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb688, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:00:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402bbbfa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:38 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x18000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:38 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:00:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:38 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x11000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) [ 1559.032417] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:00:38 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa085e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:50 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x886c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:00:50 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:00:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb788, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:00:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8988, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:50 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x60000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1571.740471] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:00:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb888, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:00:51 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:51 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x13}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:51 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:00:51 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}]}}) 16:00:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe8030000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:00:51 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:00:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8a88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:00:51 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1571.948986] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:01:03 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8b88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb988, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:03 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:01:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x20000018}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:03 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xf4010000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1584.631814] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:01:03 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xba88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) [ 1584.759399] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:01:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:01:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xfeffffff, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:16 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xedc0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:16 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x7ffff000}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbb88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7588, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbc88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1597.654094] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:01:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0xfffffdef}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:16 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xfffffffe, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:16 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) [ 1597.851086] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 16:01:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbd88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1597.910995] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 16:01:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbe88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:28 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfeff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:28 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:28 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:28 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:28 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:29 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x3, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x5, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1609.807562] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1609.811827] EXT4-fs warning (device loop2): read_mmp_block:106: Error -117 while reading MMP block 0 16:01:29 executing program 6: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbf88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbd88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xff03, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:29 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid}, {@mmap}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:29 executing program 7: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1609.993023] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:01:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x6, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1610.138247] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:01:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc088, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:41 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x8, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x3, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:41 executing program 7: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:41 executing program 6: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:41 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffe, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:41 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:41 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc188, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x11, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 6: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x21, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc288, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:53 executing program 7: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x5865, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:53 executing program 6: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc388, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:01:53 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, 0x0) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:01:53 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 7: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0xffffa888, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:01:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:01:53 executing program 6: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc488, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:06 executing program 6: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb00, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:02:06 executing program 2: socket$packet(0x11, 0x2, 0x300) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000002}}}], 0x20}, 0x0) 16:02:06 executing program 7: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:06 executing program 2: socket$packet(0x11, 0x2, 0x300) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0xf, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc588, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1647.266848] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1647.268443] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/223/file0 supports timestamps until 2038 (0x7fffffff) 16:02:18 executing program 6: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:18 executing program 2: socket$packet(0x11, 0x2, 0x300) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:18 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:02:18 executing program 7: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc688, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:18 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000003}}}], 0x20}, 0x0) 16:02:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc788, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x2, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:19 executing program 6: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1659.832580] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1659.833817] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/224/file0 supports timestamps until 2038 (0x7fffffff) 16:02:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000006}}}], 0x20}, 0x0) 16:02:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000001dc0)='./file0\x00', 0x40, 0x4) 16:02:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:19 executing program 7: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:19 executing program 2: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:19 executing program 6: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc888, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x4, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1660.090225] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1660.091421] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/225/file0 supports timestamps until 2038 (0x7fffffff) 16:02:19 executing program 7: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x40, 0x4) [ 1660.264352] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1660.265407] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/226/file0 supports timestamps until 2038 (0x7fffffff) 16:02:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc988, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000008}}}], 0x20}, 0x0) 16:02:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x4) 16:02:32 executing program 7: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:32 executing program 2: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x8, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:32 executing program 6: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:33 executing program 7: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xca88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:33 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:02:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000011}}}], 0x20}, 0x0) [ 1673.837057] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1673.838260] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/227/file0 supports timestamps until 2038 (0x7fffffff) 16:02:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:45 executing program 2: r0 = socket$inet(0x2, 0x0, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:45 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000021}}}], 0x20}, 0x0) 16:02:45 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:02:45 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:02:45 executing program 7: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcb88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:45 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:02:45 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:02:45 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe00000bb}}}], 0x20}, 0x0) 16:02:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcc88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1686.051478] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1686.053031] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/228/file0 supports timestamps until 2038 (0x7fffffff) 16:02:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe000bb00}}}], 0x20}, 0x0) 16:02:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:02:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xca88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:58 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:58 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:02:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcd88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:58 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:58 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0xf}, 0x0) 16:02:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xce88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:02:58 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:02:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x18, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:02:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20100000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x60, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc888, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x13}, 0x0) 16:03:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcf88, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20100000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x18}, 0x0) 16:03:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1f4, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 2: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xedc0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x40000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6b880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x1c}, 0x0) 16:03:23 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20100000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x300, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 2: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 2: socket$inet(0x2, 0x3, 0xff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfeff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:23 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3e8, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6c880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x24}, 0x0) 16:03:23 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x18, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:03:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x30}, 0x0) 16:03:35 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa00, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6d880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:35 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:35 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xff03, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:35 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe00, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:03:36 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffe, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:36 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20000220}, 0x0) 16:03:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6e880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, 0x0, 0x0) 16:03:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6f880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:03:48 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1100, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa00, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1800, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:03:48 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:03:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x2}, 0x0) 16:03:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:03:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x70880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1749.360309] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1749.362330] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/238/file0 supports timestamps until 2038 (0x7fffffff) [ 1749.365866] FAULT_INJECTION: forcing a failure. [ 1749.365866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1749.367397] CPU: 1 PID: 13120 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 1749.368328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1749.369697] Call Trace: [ 1749.370106] dump_stack+0x107/0x163 [ 1749.370614] should_fail.cold+0x5/0xa [ 1749.371115] _copy_to_user+0x2e/0x180 [ 1749.371631] simple_read_from_buffer+0xcc/0x160 [ 1749.372268] proc_fail_nth_read+0x194/0x220 [ 1749.372886] ? proc_sessionid_read+0x220/0x220 [ 1749.373484] ? security_file_permission+0x24e/0x570 [ 1749.374032] ? proc_sessionid_read+0x220/0x220 [ 1749.374646] vfs_read+0x228/0x580 [ 1749.375115] ksys_read+0x12d/0x250 [ 1749.375510] ? __ia32_sys_pwrite64+0x230/0x230 [ 1749.376143] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1749.376829] do_syscall_64+0x33/0x40 [ 1749.377353] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1749.377932] RIP: 0033:0x41935c [ 1749.378283] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1749.380351] RSP: 002b:00007fb30f243170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1749.381473] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 1749.382414] RDX: 000000000000000f RSI: 00007fb30f2431e0 RDI: 0000000000000003 [ 1749.383413] RBP: 00007fb30f2431d0 R08: 0000000000000000 R09: 0000000000000000 [ 1749.384329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1749.385131] R13: 00007ffeb1cd02ef R14: 00007fb30f243300 R15: 0000000000022000 16:04:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:03 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x3}, 0x0) 16:04:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x6000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:04:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x71880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:04:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x4}, 0x0) 16:04:03 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x72880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1764.075547] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1764.077339] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/239/file0 supports timestamps until 2038 (0x7fffffff) 16:04:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe803, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:03 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x4) open$dir(0x0, 0x0, 0x0) [ 1764.290626] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1764.296299] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/240/file0 supports timestamps until 2038 (0x7fffffff) 16:04:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xb) open$dir(0x0, 0x0, 0x0) 16:04:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xf401, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x73880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:04:17 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x8}, 0x0) 16:04:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x34000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xa}, 0x0) 16:04:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x74880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1777.941122] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:04:17 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1777.942351] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/241/file0 supports timestamps until 2038 (0x7fffffff) 16:04:17 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xb00) open$dir(0x0, 0x0, 0x0) 16:04:17 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe}, 0x0) 16:04:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:17 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1778.203013] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:04:17 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x400300, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1778.227808] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/242/file0 supports timestamps until 2038 (0x7fffffff) 16:04:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:29 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x2000) open$dir(0x0, 0x0, 0x0) 16:04:29 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x75880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:04:29 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x11}, 0x0) 16:04:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1790.530842] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1790.534108] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/243/file0 supports timestamps until 2038 (0x7fffffff) 16:04:42 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xff0f) open$dir(0x0, 0x0, 0x0) 16:04:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:42 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x18}, 0x0) 16:04:42 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x2000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x76880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:04:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x77880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:04:42 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:42 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x60}, 0x0) [ 1803.329364] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1803.330433] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/244/file0 supports timestamps until 2038 (0x7fffffff) 16:04:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:42 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x40000) open$dir(0x0, 0x0, 0x0) 16:04:42 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1803.556353] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1803.564117] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/245/file0 supports timestamps until 2038 (0x7fffffff) 16:04:54 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x200000) open$dir(0x0, 0x0, 0x0) 16:04:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:54 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x78880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:04:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1f4}, 0x0) 16:04:54 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x4000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:04:54 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:54 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x300}, 0x0) 16:04:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x79880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1815.715490] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1815.718260] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/246/file0 supports timestamps until 2038 (0x7fffffff) 16:04:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x8000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:04:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:06 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x1000000) open$dir(0x0, 0x0, 0x0) 16:05:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x3e8}, 0x0) 16:05:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7a880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:06 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7b880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1827.643372] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1827.644839] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/247/file0 supports timestamps until 2038 (0x7fffffff) 16:05:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xa00}, 0x0) 16:05:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20100000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:06 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x4000000) open$dir(0x0, 0x0, 0x0) [ 1827.875175] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1827.878027] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/248/file0 supports timestamps until 2038 (0x7fffffff) 16:05:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xb000000) open$dir(0x0, 0x0, 0x0) 16:05:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7c880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x11000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:19 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:19 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe00}, 0x0) 16:05:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x18000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x40000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7d880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:19 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1840.249101] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1840.250279] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/249/file0 supports timestamps until 2038 (0x7fffffff) 16:05:19 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1100}, 0x0) 16:05:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:19 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xfbffffff) open$dir(0x0, 0x0, 0x0) 16:05:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x61154394, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1840.515971] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1840.518161] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/250/file0 supports timestamps until 2038 (0x7fffffff) 16:05:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xfeffffff) open$dir(0x0, 0x0, 0x0) 16:05:32 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x60000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7e880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:32 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:05:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x84200000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1800}, 0x0) 16:05:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8cffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa05", 0xc}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:32 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:32 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) [ 1853.030605] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1853.031929] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/251/file0 supports timestamps until 2038 (0x7fffffff) 16:05:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xe8030000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xf4010000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:45 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x6000}, 0x0) 16:05:45 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:05:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x94431561, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7f880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:45 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xff0f0000) open$dir(0x0, 0x0, 0x0) 16:05:45 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x97ffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x80880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:45 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:05:45 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1866.311500] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1866.313052] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/252/file0 supports timestamps until 2038 (0x7fffffff) 16:05:45 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe803}, 0x0) 16:05:45 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xfeffffff, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:45 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xfffffffb) open$dir(0x0, 0x0, 0x0) 16:05:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x99c5deaa, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dd", 0x12}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1866.545384] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1866.547448] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/253/file0 supports timestamps until 2038 (0x7fffffff) 16:05:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa1880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:58 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:05:58 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xfffffffe) open$dir(0x0, 0x0, 0x0) 16:05:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xf401}, 0x0) 16:05:58 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x81880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:05:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xfffffffe, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa2880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:05:58 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:05:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x34000}, 0x0) 16:05:58 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:05:58 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1879.182345] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1879.183843] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/254/file0 supports timestamps until 2038 (0x7fffffff) 16:05:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:05:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x82880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x400300}, 0x0) 16:06:10 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa3880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878", 0x15}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x4000000000000) open$dir(0x0, 0x0, 0x0) 16:06:10 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:06:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x5, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x83880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:10 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:06:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:10 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa4880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1891.629899] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1891.631138] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/255/file0 supports timestamps until 2038 (0x7fffffff) 16:06:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x84200000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x20000000000000) open$dir(0x0, 0x0, 0x0) 16:06:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1000000}, 0x0) 16:06:10 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:06:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa5880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:11 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xb000000) open$dir(0x0, 0x0, 0x0) [ 1891.792636] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1891.794144] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/256/file0 supports timestamps until 2038 (0x7fffffff) [ 1891.858584] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1891.867456] ext4 filesystem being mounted at /syzkaller-testdir258166516/syzkaller.YCUGI9/274/file0 supports timestamps until 2038 (0x7fffffff) 16:06:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x2000000}, 0x0) 16:06:24 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:24 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa6880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:24 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:06:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x84880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:24 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x100000000000000) open$dir(0x0, 0x0, 0x0) 16:06:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x5865, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:24 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124", 0x17}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:24 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xb00) open$dir(0x0, 0x0, 0x0) 16:06:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa7880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:24 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:06:24 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0xffffa888, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:24 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x3000000}, 0x0) [ 1904.898366] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1904.899527] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/257/file0 supports timestamps until 2038 (0x7fffffff) 16:06:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x85880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1905.062680] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1905.064063] ext4 filesystem being mounted at /syzkaller-testdir258166516/syzkaller.YCUGI9/276/file0 supports timestamps until 2038 (0x7fffffff) 16:06:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x86880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:06:36 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x400000000000000) open$dir(0x0, 0x0, 0x0) 16:06:36 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x4}, 0x0) 16:06:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x4000000}, 0x0) 16:06:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa8880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000002}}}], 0x20}, 0x0) 16:06:36 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x74880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000003}}}], 0x20}, 0x0) 16:06:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x87880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:06:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa9880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x70880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x8000000}, 0x0) [ 1916.918866] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1916.920773] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/258/file0 supports timestamps until 2038 (0x7fffffff) 16:06:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x70880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:49 executing program 7 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:06:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x88880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xaa880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:06:49 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xb00000000000000) open$dir(0x0, 0x0, 0x0) 16:06:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1}, 0x0) 16:06:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000006}}}], 0x20}, 0x0) 16:06:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xa000000}, 0x0) [ 1930.268767] FAULT_INJECTION: forcing a failure. [ 1930.268767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1930.270141] CPU: 1 PID: 14021 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1930.270923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1930.272123] Call Trace: [ 1930.272424] dump_stack+0x107/0x163 [ 1930.272848] should_fail.cold+0x5/0xa [ 1930.273293] _copy_from_user+0x2e/0x1b0 [ 1930.273758] __copy_msghdr_from_user+0x91/0x4b0 [ 1930.274297] ? __ia32_sys_shutdown+0x70/0x70 [ 1930.274809] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1930.275415] ? SOFTIRQ_verbose+0x10/0x10 [ 1930.275884] ? __lock_acquire+0xbc2/0x5b20 [ 1930.276373] sendmsg_copy_msghdr+0xa1/0x160 [ 1930.276852] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1930.277375] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1930.277962] ? SOFTIRQ_verbose+0x10/0x10 [ 1930.278407] ? lock_downgrade+0x6d0/0x6d0 [ 1930.278883] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1930.279467] ? SOFTIRQ_verbose+0x10/0x10 [ 1930.279923] ___sys_sendmsg+0xc6/0x170 [ 1930.280364] ? sendmsg_copy_msghdr+0x160/0x160 [ 1930.280879] ? __fget_files+0x228/0x410 [ 1930.281322] ? lock_downgrade+0x6d0/0x6d0 [ 1930.281786] ? find_held_lock+0x2c/0x110 [ 1930.282247] ? __fget_files+0x251/0x410 [ 1930.282697] ? __fget_light+0xea/0x280 [ 1930.283148] __sys_sendmsg+0xe5/0x1b0 [ 1930.283574] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1930.284059] ? rcu_read_lock_any_held+0x69/0x90 [ 1930.284586] ? fput_many+0x2f/0x1a0 [ 1930.285004] ? ksys_write+0x1a5/0x250 [ 1930.285447] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1930.286000] do_syscall_64+0x33/0x40 [ 1930.286413] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1930.286973] RIP: 0033:0x466609 [ 1930.287330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1930.289448] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1930.290317] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1930.291146] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1930.291900] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1930.292722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1930.293545] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 16:06:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe000000}, 0x0) 16:06:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:06:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x89880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000008}}}], 0x20}, 0x0) 16:06:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xaadec599, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1930.355058] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1930.357409] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/259/file0 supports timestamps until 2038 (0x7fffffff) 16:06:49 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x70880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:06:49 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xfbffffff00000000) open$dir(0x0, 0x0, 0x0) [ 1930.624455] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1930.625527] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/260/file0 supports timestamps until 2038 (0x7fffffff) 16:07:09 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:07:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x11000000}, 0x0) 16:07:09 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xfeffffff00000000) open$dir(0x0, 0x0, 0x0) 16:07:09 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xaa880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:09 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000011}}}], 0x20}, 0x0) 16:07:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8a880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:07:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xab880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:09 executing program 7 (fault-call:1 fault-nth:1): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1950.409241] FAULT_INJECTION: forcing a failure. [ 1950.409241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1950.410666] CPU: 0 PID: 14082 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1950.411468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1950.412769] Call Trace: [ 1950.413067] dump_stack+0x107/0x163 [ 1950.413483] should_fail.cold+0x5/0xa [ 1950.413920] _copy_from_user+0x2e/0x1b0 [ 1950.414371] move_addr_to_kernel.part.0+0x31/0x110 [ 1950.414943] __copy_msghdr_from_user+0x3dd/0x4b0 [ 1950.415553] ? __ia32_sys_shutdown+0x70/0x70 [ 1950.416069] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1950.416681] ? __lock_acquire+0xbc2/0x5b20 [ 1950.417168] sendmsg_copy_msghdr+0xa1/0x160 [ 1950.417657] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1950.418180] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1950.418787] ? SOFTIRQ_verbose+0x10/0x10 [ 1950.419269] ? lock_downgrade+0x6d0/0x6d0 [ 1950.419747] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1950.420341] ? SOFTIRQ_verbose+0x10/0x10 [ 1950.420799] ___sys_sendmsg+0xc6/0x170 [ 1950.421235] ? sendmsg_copy_msghdr+0x160/0x160 [ 1950.421758] ? __fget_files+0x228/0x410 [ 1950.422210] ? lock_downgrade+0x6d0/0x6d0 [ 1950.422687] ? find_held_lock+0x2c/0x110 [ 1950.423154] ? __fget_files+0x251/0x410 [ 1950.423623] ? __fget_light+0xea/0x280 [ 1950.424070] __sys_sendmsg+0xe5/0x1b0 [ 1950.424487] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1950.424981] ? rcu_read_lock_any_held+0x69/0x90 [ 1950.425517] ? fput_many+0x2f/0x1a0 [ 1950.425935] ? ksys_write+0x1a5/0x250 [ 1950.426368] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1950.426919] do_syscall_64+0x33/0x40 [ 1950.427348] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1950.427938] RIP: 0033:0x466609 [ 1950.428305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1950.430417] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1950.431309] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1950.432117] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1950.432912] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1950.433710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1950.434511] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 16:07:09 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)}, 0x0) 16:07:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xac880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:09 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xfbffffff00000000) open$dir(0x0, 0x0, 0x0) 16:07:09 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000021}}}], 0x20}, 0x0) 16:07:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x18000000}, 0x0) [ 1950.512703] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1950.514205] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/261/file0 supports timestamps until 2038 (0x7fffffff) 16:07:09 executing program 7 (fault-call:1 fault-nth:2): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8b880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:07:09 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xff0f000000000000) open$dir(0x0, 0x0, 0x0) 16:07:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000011}}}], 0x20}, 0x0) [ 1950.626161] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 1950.627480] ext4 filesystem being mounted at /syzkaller-testdir258166516/syzkaller.YCUGI9/282/file0 supports timestamps until 2038 (0x7fffffff) 16:07:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xad880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1950.699151] FAULT_INJECTION: forcing a failure. [ 1950.699151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1950.700618] CPU: 0 PID: 14131 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1950.701378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1950.702676] Call Trace: [ 1950.702983] dump_stack+0x107/0x163 [ 1950.703418] should_fail.cold+0x5/0xa [ 1950.703864] _copy_from_user+0x2e/0x1b0 [ 1950.704326] iovec_from_user+0x139/0x3f0 [ 1950.704795] ? move_addr_to_kernel.part.0+0xc8/0x110 [ 1950.705372] __import_iovec+0x67/0x590 [ 1950.705809] ? __ia32_sys_shutdown+0x70/0x70 [ 1950.706315] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1950.706920] import_iovec+0x83/0xb0 [ 1950.707351] sendmsg_copy_msghdr+0x12d/0x160 [ 1950.707844] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1950.708363] ? SOFTIRQ_verbose+0x10/0x10 [ 1950.708818] ? lock_downgrade+0x6d0/0x6d0 [ 1950.709287] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1950.709883] ? SOFTIRQ_verbose+0x10/0x10 [ 1950.710350] ___sys_sendmsg+0xc6/0x170 [ 1950.710794] ? sendmsg_copy_msghdr+0x160/0x160 [ 1950.711330] ? __fget_files+0x228/0x410 [ 1950.711778] ? lock_downgrade+0x6d0/0x6d0 [ 1950.712254] ? find_held_lock+0x2c/0x110 [ 1950.712728] ? __fget_files+0x251/0x410 [ 1950.713184] ? __fget_light+0xea/0x280 [ 1950.713635] __sys_sendmsg+0xe5/0x1b0 [ 1950.714070] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1950.714566] ? rcu_read_lock_any_held+0x69/0x90 [ 1950.715102] ? fput_many+0x2f/0x1a0 [ 1950.715523] ? ksys_write+0x1a5/0x250 [ 1950.715951] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1950.716498] do_syscall_64+0x33/0x40 [ 1950.716918] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1950.717508] RIP: 0033:0x466609 [ 1950.717875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1950.720015] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1950.720888] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1950.721713] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1950.722528] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1950.723359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1950.724182] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 1950.774830] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1950.784208] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/262/file0 supports timestamps until 2038 (0x7fffffff) 16:07:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8cffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:07:23 executing program 6 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0xffffffff00000000) open$dir(0x0, 0x0, 0x0) 16:07:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xae880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe00000bb}}}], 0x20}, 0x0) 16:07:23 executing program 7 (fault-call:1 fault-nth:3): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x60000000}, 0x0) 16:07:23 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1963.968478] FAULT_INJECTION: forcing a failure. [ 1963.968478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1963.969916] CPU: 1 PID: 14171 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 1963.970798] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1963.972017] Call Trace: [ 1963.972361] dump_stack+0x107/0x163 [ 1963.972839] should_fail.cold+0x5/0xa [ 1963.973255] _copy_from_user+0x2e/0x1b0 [ 1963.973776] __copy_msghdr_from_user+0x91/0x4b0 [ 1963.974279] ? __ia32_sys_shutdown+0x70/0x70 [ 1963.974844] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1963.975417] ? SOFTIRQ_verbose+0x10/0x10 [ 1963.975943] ? __lock_acquire+0xbc2/0x5b20 [ 1963.976405] sendmsg_copy_msghdr+0xa1/0x160 [ 1963.976957] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1963.977458] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1963.978128] ? SOFTIRQ_verbose+0x10/0x10 [ 1963.978564] ? lock_downgrade+0x6d0/0x6d0 [ 1963.979097] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1963.979669] ? SOFTIRQ_verbose+0x10/0x10 [ 1963.980194] ___sys_sendmsg+0xc6/0x170 [ 1963.980617] ? sendmsg_copy_msghdr+0x160/0x160 [ 1963.981206] ? __fget_files+0x228/0x410 [ 1963.981636] ? lock_downgrade+0x6d0/0x6d0 [ 1963.982167] ? find_held_lock+0x2c/0x110 [ 1963.982614] ? __fget_files+0x251/0x410 [ 1963.983130] ? __fget_light+0xea/0x280 [ 1963.983571] __sys_sendmsg+0xe5/0x1b0 [ 1963.984063] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1963.984535] ? rcu_read_lock_any_held+0x69/0x90 [ 1963.985139] ? fput_many+0x2f/0x1a0 [ 1963.985538] ? ksys_write+0x1a5/0x250 [ 1963.986031] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1963.986555] do_syscall_64+0x33/0x40 [ 1963.987034] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1963.987598] RIP: 0033:0x466609 [ 1963.988013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1963.989993] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1963.990182] FAULT_INJECTION: forcing a failure. [ 1963.990182] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1963.990976] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1963.990983] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1963.990989] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1963.990994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1963.991000] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 [ 1963.996620] CPU: 0 PID: 14172 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1963.997416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1963.998728] Call Trace: [ 1963.999032] dump_stack+0x107/0x163 [ 1963.999470] should_fail.cold+0x5/0xa [ 1963.999918] _copy_from_user+0x2e/0x1b0 [ 1964.000383] ____sys_sendmsg+0x194/0x870 [ 1964.000853] ? kernel_sendmsg+0x50/0x50 [ 1964.001315] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1964.001847] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.002317] ? lock_downgrade+0x6d0/0x6d0 [ 1964.002808] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.003422] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.003895] ___sys_sendmsg+0xf3/0x170 [ 1964.004344] ? sendmsg_copy_msghdr+0x160/0x160 [ 1964.004873] ? __fget_files+0x228/0x410 [ 1964.005330] ? lock_downgrade+0x6d0/0x6d0 [ 1964.005802] ? find_held_lock+0x2c/0x110 [ 1964.006273] ? __fget_files+0x251/0x410 [ 1964.006737] ? __fget_light+0xea/0x280 [ 1964.007184] __sys_sendmsg+0xe5/0x1b0 [ 1964.007634] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1964.008133] ? rcu_read_lock_any_held+0x69/0x90 [ 1964.008689] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1964.009261] do_syscall_64+0x33/0x40 [ 1964.009697] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1964.010286] RIP: 0033:0x466609 [ 1964.010665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.012819] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1964.013694] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1964.014535] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1964.015363] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1964.016193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.017018] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 1964.027438] FAULT_INJECTION: forcing a failure. [ 1964.027438] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:07:23 executing program 6 (fault-call:1 fault-nth:1): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1964.028860] CPU: 1 PID: 14166 Comm: syz-executor.2 Not tainted 5.10.56 #1 [ 1964.029886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1964.031655] Call Trace: [ 1964.032002] dump_stack+0x107/0x163 [ 1964.032569] should_fail.cold+0x5/0xa [ 1964.032991] _copy_from_user+0x2e/0x1b0 [ 1964.033604] __copy_msghdr_from_user+0x91/0x4b0 [ 1964.034250] ? __ia32_sys_shutdown+0x70/0x70 [ 1964.034881] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.035518] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.036204] ? __lock_acquire+0xbc2/0x5b20 [ 1964.036766] sendmsg_copy_msghdr+0xa1/0x160 [ 1964.037331] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1964.037920] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.038751] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.039236] ? lock_downgrade+0x6d0/0x6d0 [ 1964.039870] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.040598] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.041197] ___sys_sendmsg+0xc6/0x170 [ 1964.041745] ? sendmsg_copy_msghdr+0x160/0x160 [ 1964.042396] ? __fget_files+0x228/0x410 [ 1964.042925] ? lock_downgrade+0x6d0/0x6d0 [ 1964.043608] ? find_held_lock+0x2c/0x110 [ 1964.044123] ? __fget_files+0x251/0x410 [ 1964.044731] ? __fget_light+0xea/0x280 [ 1964.045306] __sys_sendmsg+0xe5/0x1b0 [ 1964.045860] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1964.046427] ? rcu_read_lock_any_held+0x69/0x90 [ 1964.047048] ? fput_many+0x2f/0x1a0 [ 1964.047589] ? ksys_write+0x1a5/0x250 [ 1964.048124] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1964.048650] do_syscall_64+0x33/0x40 [ 1964.049237] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1964.049860] RIP: 0033:0x466609 [ 1964.050391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.052592] RSP: 002b:00007f6142ab5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1964.053677] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1964.054653] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1964.055484] RBP: 00007f6142ab51d0 R08: 0000000000000000 R09: 0000000000000000 16:07:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xaf880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1964.056372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.057323] R13: 00007ffdced4a73f R14: 00007f6142ab5300 R15: 0000000000022000 [ 1964.101374] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1964.102526] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/263/file0 supports timestamps until 2038 (0x7fffffff) 16:07:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe000bb00}}}], 0x20}, 0x0) 16:07:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc0ed0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:07:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000012b00)=ANY=[]) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x4, &(0x7f0000001400)=[{&(0x7f0000000180)="67af8e07d144f57cd4ac21bf25e19f2fb6dd57a4c69d9fb9a2f072a236979ff8aa8aaea85b254fa08601622303126787c1aaeeecbdbb526cd49f1e0a952e443a5a375cdcb7d3003bec85d4ccd56941701a5976e2888b23a5b9d48020ea97fd68d0f54f3667f831b387cc3bef36c00b0a864367aa25d5809fcce074253a11906cf2bdd1a5b57910cf6782894fcc60dda8d66dbbaac52c5dcc9e5312e0ae5cddb70d364e4eede614a6bf6b755827b673b1a6b5bbe99a3247817217c053a7854f8ef692e49cb83a85fec991a806ca7e1626b39675a1ca5f0d2ef19c5b8920044617ad40345c142b46", 0xe7, 0x9}, {&(0x7f0000000280)="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", 0x1000, 0x51}, {&(0x7f0000001280)="4362ef4162c3a993bec134141f59c225ff2b2b3766c43fcf1dd1674f14a694a9ab0579b4b3847aa2fddafe7c89ca8c58410784e06d6bd8088d100a9870f1b39b533a50b423823d62c28c721bb27d3cb2af44ff1e8244f9b04ff2c297b450b36f0b82ccd686e68b934a9b9495d95f2bd54bfe355763c85175e06f294680173eb1a8f70d876b56cc1497131e96cda7f17b4bb9771ab90ee023d473764cf3e8a8ef704eb6d6596f2998d0d46bf605576a703e55", 0xb2, 0x7ff}, {&(0x7f0000001340)="d6a2c93d51b44efa97381c1a81af3e6917448085eac24c55af291b9aabc3b5f4ce17d4460447ca6bdef0ea4c9804fa9c6bc46a3a11087423a4567a2d3e1d14a36318aed427c132019a68bb24775de08f543bdee706c8619d9a2709560a007be87d834a08ca5b5294bf5894e9c932c9c2b548bb4414022660403f574c6182019387405162ef1c723b2e895cd8d38d52ce887053fa8b", 0x95, 0x100}], 0x100008, &(0x7f0000001600)=ANY=[@ANYBLOB='huge=always,size=p1t5,size=3,rootcontext=user_u,smackfstransmute=&,dont_appraise,fowner>', @ANYRESDEC=r1, @ANYBLOB="2c726f6f74636f6e746578743d720500742c00156d7a0942e9e41b32642f3690939959833c"]) statfs(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/30) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) [ 1964.151086] FAULT_INJECTION: forcing a failure. 16:07:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe8030000}, 0x0) [ 1964.151086] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1964.152700] CPU: 1 PID: 14190 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 1964.153596] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1964.154852] Call Trace: [ 1964.155201] dump_stack+0x107/0x163 [ 1964.155704] should_fail.cold+0x5/0xa [ 1964.156208] _copy_from_user+0x2e/0x1b0 [ 1964.156739] move_addr_to_kernel.part.0+0x31/0x110 [ 1964.157644] __copy_msghdr_from_user+0x3dd/0x4b0 [ 1964.158432] ? __ia32_sys_shutdown+0x70/0x70 [ 1964.159007] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.159719] ? __lock_acquire+0xbc2/0x5b20 [ 1964.160275] sendmsg_copy_msghdr+0xa1/0x160 [ 1964.160836] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1964.161431] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.162089] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.162608] ? lock_downgrade+0x6d0/0x6d0 [ 1964.163091] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.163784] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.164523] ___sys_sendmsg+0xc6/0x170 [ 1964.164966] ? sendmsg_copy_msghdr+0x160/0x160 [ 1964.165560] ? __fget_files+0x228/0x410 [ 1964.166015] ? lock_downgrade+0x6d0/0x6d0 [ 1964.166553] ? find_held_lock+0x2c/0x110 [ 1964.167021] ? __fget_files+0x251/0x410 [ 1964.167556] ? __fget_light+0xea/0x280 [ 1964.168010] __sys_sendmsg+0xe5/0x1b0 [ 1964.168500] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1964.168999] ? rcu_read_lock_any_held+0x69/0x90 [ 1964.169601] ? fput_many+0x2f/0x1a0 [ 1964.170018] ? ksys_write+0x1a5/0x250 [ 1964.170519] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1964.171072] do_syscall_64+0x33/0x40 [ 1964.171573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1964.172237] RIP: 0033:0x466609 [ 1964.172610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.174987] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1964.175867] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1964.176688] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1964.177520] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1964.178345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.179142] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:07:23 executing program 7 (fault-call:1 fault-nth:4): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:23 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 1964.305084] FAULT_INJECTION: forcing a failure. [ 1964.305084] name failslab, interval 1, probability 0, space 0, times 0 [ 1964.306535] CPU: 1 PID: 14213 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1964.307332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1964.308805] Call Trace: [ 1964.309118] dump_stack+0x107/0x163 [ 1964.309594] should_fail.cold+0x5/0xa [ 1964.310102] ? dst_alloc+0x9e/0x610 [ 1964.310585] should_failslab+0x5/0x10 [ 1964.311082] kmem_cache_alloc+0x5b/0x350 [ 1964.311621] dst_alloc+0x9e/0x610 [ 1964.312111] rt_dst_alloc+0x73/0x430 [ 1964.312533] ip_route_output_key_hash_rcu+0x7ef/0x2330 [ 1964.313223] ip_route_output_key_hash+0x18d/0x300 [ 1964.313761] ? ip_route_output_key_hash_rcu+0x2330/0x2330 [ 1964.314474] ? lock_downgrade+0x6d0/0x6d0 [ 1964.314940] ? ip_cmsg_send+0x358/0x990 [ 1964.315468] ip_route_output_flow+0x23/0x150 [ 1964.315965] raw_sendmsg+0x8d3/0x2890 [ 1964.316464] ? usage_accumulate+0x20/0x100 [ 1964.316953] ? dst_output+0x170/0x170 [ 1964.317439] ? __lock_acquire+0x1666/0x5b20 [ 1964.317934] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.318616] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.319075] ? lock_downgrade+0x6d0/0x6d0 [ 1964.319555] ? lock_downgrade+0x6d0/0x6d0 [ 1964.320111] ? selinux_inode_notifysecctx+0x60/0x60 [ 1964.320666] ? find_held_lock+0x2c/0x110 [ 1964.321202] ? dst_output+0x170/0x170 [ 1964.321629] inet_sendmsg+0x115/0x140 [ 1964.322120] ? inet_send_prepare+0x4f0/0x4f0 [ 1964.322618] sock_sendmsg+0x138/0x190 [ 1964.323109] ____sys_sendmsg+0x709/0x870 [ 1964.323658] ? kernel_sendmsg+0x50/0x50 [ 1964.324103] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1964.324700] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.325152] ? lock_downgrade+0x6d0/0x6d0 [ 1964.325690] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.326274] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.326806] ___sys_sendmsg+0xf3/0x170 [ 1964.327244] ? sendmsg_copy_msghdr+0x160/0x160 [ 1964.327851] ? __fget_files+0x228/0x410 [ 1964.328295] ? lock_downgrade+0x6d0/0x6d0 [ 1964.328836] ? find_held_lock+0x2c/0x110 [ 1964.329299] ? __fget_files+0x251/0x410 [ 1964.329826] ? __fget_light+0xea/0x280 [ 1964.330271] __sys_sendmsg+0xe5/0x1b0 [ 1964.330768] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1964.331249] ? rcu_read_lock_any_held+0x69/0x90 [ 1964.331889] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1964.332434] do_syscall_64+0x33/0x40 [ 1964.332919] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1964.333578] RIP: 0033:0x466609 [ 1964.333937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.336333] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1964.337188] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1964.337986] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1964.338774] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1964.339588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.340416] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 1964.383251] FAULT_INJECTION: forcing a failure. [ 1964.383251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1964.384705] CPU: 1 PID: 14217 Comm: syz-executor.2 Not tainted 5.10.56 #1 [ 1964.385468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1964.386722] Call Trace: [ 1964.387026] dump_stack+0x107/0x163 [ 1964.387450] should_fail.cold+0x5/0xa [ 1964.387884] _copy_from_user+0x2e/0x1b0 [ 1964.388332] move_addr_to_kernel.part.0+0x31/0x110 [ 1964.388884] __copy_msghdr_from_user+0x3dd/0x4b0 [ 1964.389415] ? __ia32_sys_shutdown+0x70/0x70 [ 1964.389909] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.390494] ? __lock_acquire+0xbc2/0x5b20 [ 1964.390976] sendmsg_copy_msghdr+0xa1/0x160 [ 1964.391473] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1964.391983] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.392563] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.393015] ? lock_downgrade+0x6d0/0x6d0 [ 1964.393480] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.394058] ? SOFTIRQ_verbose+0x10/0x10 [ 1964.394512] ___sys_sendmsg+0xc6/0x170 [ 1964.394953] ? sendmsg_copy_msghdr+0x160/0x160 [ 1964.395481] ? __fget_files+0x228/0x410 [ 1964.395923] ? lock_downgrade+0x6d0/0x6d0 [ 1964.396387] ? find_held_lock+0x2c/0x110 [ 1964.396845] ? __fget_files+0x251/0x410 [ 1964.397294] ? __fget_light+0xea/0x280 [ 1964.397734] __sys_sendmsg+0xe5/0x1b0 [ 1964.398156] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1964.398636] ? rcu_read_lock_any_held+0x69/0x90 [ 1964.399159] ? fput_many+0x2f/0x1a0 [ 1964.399650] ? ksys_write+0x1a5/0x250 [ 1964.400083] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1964.400718] do_syscall_64+0x33/0x40 [ 1964.401148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1964.401817] RIP: 0033:0x466609 [ 1964.402187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.404595] RSP: 002b:00007f6142ab5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1964.405585] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1964.406506] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1964.407444] RBP: 00007f6142ab51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1964.408378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.409295] R13: 00007ffdced4a73f R14: 00007f6142ab5300 R15: 0000000000022000 [ 1964.424930] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1964.446744] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:07:36 executing program 6 (fault-call:1 fault-nth:2): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:36 executing program 7 (fault-call:1 fault-nth:5): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:36 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0xf}, 0x0) 16:07:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb0880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xe4ffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:07:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xf4010000}, 0x0) 16:07:36 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/21, 0x15) open$dir(0x0, 0x0, 0x0) [ 1977.005090] FAULT_INJECTION: forcing a failure. [ 1977.005090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1977.007290] CPU: 0 PID: 14238 Comm: syz-executor.2 Not tainted 5.10.56 #1 [ 1977.008476] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1977.009763] Call Trace: [ 1977.010050] dump_stack+0x107/0x163 [ 1977.010448] should_fail.cold+0x5/0xa [ 1977.010871] _copy_from_user+0x2e/0x1b0 [ 1977.011302] iovec_from_user+0x139/0x3f0 [ 1977.011750] ? move_addr_to_kernel.part.0+0xc8/0x110 [ 1977.012297] __import_iovec+0x67/0x590 [ 1977.012721] ? __ia32_sys_shutdown+0x70/0x70 [ 1977.013195] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.013766] import_iovec+0x83/0xb0 [ 1977.014162] sendmsg_copy_msghdr+0x12d/0x160 [ 1977.014635] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1977.015129] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.015563] ? lock_downgrade+0x6d0/0x6d0 [ 1977.016024] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.016588] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.017027] ___sys_sendmsg+0xc6/0x170 [ 1977.017447] ? sendmsg_copy_msghdr+0x160/0x160 [ 1977.017943] ? __fget_files+0x228/0x410 [ 1977.018372] ? lock_downgrade+0x6d0/0x6d0 [ 1977.018822] ? find_held_lock+0x2c/0x110 [ 1977.019266] ? __fget_files+0x251/0x410 [ 1977.019715] ? __fget_light+0xea/0x280 [ 1977.020138] __sys_sendmsg+0xe5/0x1b0 [ 1977.020550] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1977.021014] ? rcu_read_lock_any_held+0x69/0x90 [ 1977.021520] ? fput_many+0x2f/0x1a0 [ 1977.021911] ? ksys_write+0x1a5/0x250 [ 1977.022324] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1977.022851] do_syscall_64+0x33/0x40 [ 1977.023252] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1977.023816] RIP: 0033:0x466609 [ 1977.024163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.026142] RSP: 002b:00007f6142ab5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1977.026965] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1977.027745] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1977.028515] RBP: 00007f6142ab51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.029285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1977.030055] R13: 00007ffdced4a73f R14: 00007f6142ab5300 R15: 0000000000022000 [ 1977.035143] FAULT_INJECTION: forcing a failure. [ 1977.035143] name failslab, interval 1, probability 0, space 0, times 0 [ 1977.036477] CPU: 1 PID: 14243 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1977.037251] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1977.038538] Call Trace: [ 1977.038838] dump_stack+0x107/0x163 [ 1977.039258] should_fail.cold+0x5/0xa [ 1977.039711] ? create_object.isra.0+0x3a/0xa20 [ 1977.040219] should_failslab+0x5/0x10 [ 1977.040643] kmem_cache_alloc+0x5b/0x350 [ 1977.041097] create_object.isra.0+0x3a/0xa20 [ 1977.041588] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1977.042153] kmem_cache_alloc+0x159/0x350 [ 1977.042621] dst_alloc+0x9e/0x610 [ 1977.043011] rt_dst_alloc+0x73/0x430 [ 1977.043426] ip_route_output_key_hash_rcu+0x7ef/0x2330 [ 1977.044033] ip_route_output_key_hash+0x18d/0x300 [ 1977.044569] ? ip_route_output_key_hash_rcu+0x2330/0x2330 [ 1977.045179] FAULT_INJECTION: forcing a failure. [ 1977.045179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1977.045189] ? lock_downgrade+0x6d0/0x6d0 [ 1977.047073] ? ip_cmsg_send+0x358/0x990 [ 1977.047523] ip_route_output_flow+0x23/0x150 [ 1977.048029] raw_sendmsg+0x8d3/0x2890 [ 1977.048454] ? usage_accumulate+0x20/0x100 [ 1977.048933] ? dst_output+0x170/0x170 [ 1977.049357] ? __lock_acquire+0x1666/0x5b20 [ 1977.049855] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.050440] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.050906] ? lock_downgrade+0x6d0/0x6d0 [ 1977.051364] ? lock_downgrade+0x6d0/0x6d0 [ 1977.051861] ? selinux_inode_notifysecctx+0x60/0x60 [ 1977.052418] ? find_held_lock+0x2c/0x110 [ 1977.052887] ? dst_output+0x170/0x170 [ 1977.053324] inet_sendmsg+0x115/0x140 [ 1977.053751] ? inet_send_prepare+0x4f0/0x4f0 [ 1977.054247] sock_sendmsg+0x138/0x190 [ 1977.054676] ____sys_sendmsg+0x709/0x870 [ 1977.055145] ? kernel_sendmsg+0x50/0x50 [ 1977.055592] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1977.056129] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.056576] ? lock_downgrade+0x6d0/0x6d0 [ 1977.057051] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.057631] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.058090] ___sys_sendmsg+0xf3/0x170 [ 1977.058523] ? sendmsg_copy_msghdr+0x160/0x160 [ 1977.059041] ? __fget_files+0x228/0x410 [ 1977.059473] ? lock_downgrade+0x6d0/0x6d0 [ 1977.059947] ? find_held_lock+0x2c/0x110 [ 1977.060409] ? __fget_files+0x251/0x410 [ 1977.060863] ? __fget_light+0xea/0x280 [ 1977.061304] __sys_sendmsg+0xe5/0x1b0 [ 1977.061725] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1977.062203] ? rcu_read_lock_any_held+0x69/0x90 [ 1977.062737] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1977.063281] do_syscall_64+0x33/0x40 [ 1977.063718] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1977.064292] RIP: 0033:0x466609 [ 1977.064654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.066692] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1977.067548] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1977.068350] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1977.069144] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.069941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1977.070731] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 1977.071550] CPU: 0 PID: 14245 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 1977.072467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1977.073948] Call Trace: [ 1977.074355] dump_stack+0x107/0x163 [ 1977.074765] should_fail.cold+0x5/0xa [ 1977.075193] _copy_from_user+0x2e/0x1b0 [ 1977.075634] iovec_from_user+0x139/0x3f0 [ 1977.076110] ? move_addr_to_kernel.part.0+0xc8/0x110 [ 1977.076656] __import_iovec+0x67/0x590 [ 1977.077095] ? __ia32_sys_shutdown+0x70/0x70 [ 1977.077574] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.078179] import_iovec+0x83/0xb0 [ 1977.078576] sendmsg_copy_msghdr+0x12d/0x160 [ 1977.079096] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1977.079596] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.080074] ? lock_downgrade+0x6d0/0x6d0 [ 1977.080525] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.081114] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.081570] ___sys_sendmsg+0xc6/0x170 [ 1977.082048] ? sendmsg_copy_msghdr+0x160/0x160 [ 1977.082555] ? __fget_files+0x228/0x410 [ 1977.083010] ? lock_downgrade+0x6d0/0x6d0 [ 1977.083465] ? find_held_lock+0x2c/0x110 [ 1977.083920] ? __fget_files+0x251/0x410 [ 1977.084352] ? __fget_light+0xea/0x280 [ 1977.084777] __sys_sendmsg+0xe5/0x1b0 [ 1977.085189] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1977.085647] ? rcu_read_lock_any_held+0x69/0x90 [ 1977.086157] ? fput_many+0x2f/0x1a0 [ 1977.086545] ? ksys_write+0x1a5/0x250 [ 1977.086956] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1977.087476] do_syscall_64+0x33/0x40 [ 1977.087896] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1977.088441] RIP: 0033:0x466609 [ 1977.088788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.090725] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1977.091541] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1977.092317] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1977.093079] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.093849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1977.094621] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:07:36 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x18}, 0x0) 16:07:36 executing program 6 (fault-call:1 fault-nth:3): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xf6ffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:07:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb1880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xfeffffff}, 0x0) [ 1977.147350] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1977.148515] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/265/file0 supports timestamps until 2038 (0x7fffffff) 16:07:36 executing program 7 (fault-call:1 fault-nth:6): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2, 0x3}) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000180)) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r2, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg(r3, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) [ 1977.257969] FAULT_INJECTION: forcing a failure. [ 1977.257969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1977.259338] CPU: 0 PID: 14265 Comm: syz-executor.2 Not tainted 5.10.56 #1 [ 1977.260141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1977.261504] Call Trace: [ 1977.261805] dump_stack+0x107/0x163 [ 1977.262220] should_fail.cold+0x5/0xa [ 1977.262663] _copy_from_user+0x2e/0x1b0 [ 1977.263115] ____sys_sendmsg+0x194/0x870 [ 1977.263571] ? kernel_sendmsg+0x50/0x50 [ 1977.264036] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1977.264559] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.264992] ? lock_downgrade+0x6d0/0x6d0 [ 1977.265468] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.266029] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.266499] ___sys_sendmsg+0xf3/0x170 [ 1977.266917] ? sendmsg_copy_msghdr+0x160/0x160 [ 1977.267437] ? __fget_files+0x228/0x410 [ 1977.267872] ? lock_downgrade+0x6d0/0x6d0 [ 1977.268339] ? find_held_lock+0x2c/0x110 [ 1977.268790] ? __fget_files+0x251/0x410 [ 1977.269256] ? __fget_light+0xea/0x280 [ 1977.269689] __sys_sendmsg+0xe5/0x1b0 [ 1977.270126] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1977.270617] ? rcu_read_lock_any_held+0x69/0x90 [ 1977.271154] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1977.271690] do_syscall_64+0x33/0x40 [ 1977.272127] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1977.272686] RIP: 0033:0x466609 [ 1977.273053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.275062] RSP: 002b:00007f6142ab5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1977.275937] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1977.276737] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1977.277548] RBP: 00007f6142ab51d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.278351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1977.279166] R13: 00007ffdced4a73f R14: 00007f6142ab5300 R15: 0000000000022000 16:07:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x1b}, 0x0) [ 1977.318707] FAULT_INJECTION: forcing a failure. [ 1977.318707] name failslab, interval 1, probability 0, space 0, times 0 [ 1977.320149] CPU: 0 PID: 14275 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1977.320978] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1977.322198] Call Trace: [ 1977.322489] dump_stack+0x107/0x163 [ 1977.322890] should_fail.cold+0x5/0xa [ 1977.323302] ? __alloc_skb+0x6d/0x620 [ 1977.323732] ? __alloc_skb+0x6d/0x620 [ 1977.324149] should_failslab+0x5/0x10 [ 1977.324560] kmem_cache_alloc_node+0x55/0x370 [ 1977.325048] __alloc_skb+0x6d/0x620 [ 1977.325446] alloc_skb_with_frags+0x92/0x570 [ 1977.325922] ? ip_route_output_key_hash+0x1a4/0x300 [ 1977.326468] ? lock_downgrade+0x6d0/0x6d0 [ 1977.326924] sock_alloc_send_pskb+0x73d/0x8a0 [ 1977.327413] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1977.327952] ? sk_reset_timer+0xc0/0xc0 [ 1977.328388] ? lock_downgrade+0x6d0/0x6d0 [ 1977.328843] ? xfrm_lookup_route+0x65/0x1f0 [ 1977.329317] raw_sendmsg+0x13bd/0x2890 [ 1977.329743] ? usage_accumulate+0x20/0x100 [ 1977.330203] ? dst_output+0x170/0x170 [ 1977.330616] ? __lock_acquire+0x1666/0x5b20 [ 1977.331094] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.331676] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.332114] ? lock_downgrade+0x6d0/0x6d0 [ 1977.332567] ? lock_downgrade+0x6d0/0x6d0 [ 1977.333029] ? selinux_inode_notifysecctx+0x60/0x60 [ 1977.333569] ? find_held_lock+0x2c/0x110 [ 1977.334021] ? dst_output+0x170/0x170 [ 1977.334435] inet_sendmsg+0x115/0x140 [ 1977.334848] ? inet_send_prepare+0x4f0/0x4f0 [ 1977.335330] sock_sendmsg+0x138/0x190 [ 1977.335752] ____sys_sendmsg+0x709/0x870 [ 1977.336193] ? kernel_sendmsg+0x50/0x50 [ 1977.336628] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1977.337124] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.337562] ? lock_downgrade+0x6d0/0x6d0 [ 1977.338012] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.338587] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.339028] ___sys_sendmsg+0xf3/0x170 [ 1977.339457] ? sendmsg_copy_msghdr+0x160/0x160 [ 1977.339982] ? __fget_files+0x228/0x410 [ 1977.340426] ? lock_downgrade+0x6d0/0x6d0 [ 1977.340891] ? find_held_lock+0x2c/0x110 [ 1977.341350] ? __fget_files+0x251/0x410 [ 1977.341799] ? __fget_light+0xea/0x280 [ 1977.342236] __sys_sendmsg+0xe5/0x1b0 [ 1977.342662] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1977.343143] ? rcu_read_lock_any_held+0x69/0x90 [ 1977.343679] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1977.344220] do_syscall_64+0x33/0x40 [ 1977.344643] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1977.345213] RIP: 0033:0x466609 [ 1977.345574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.347640] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1977.348493] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1977.349293] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1977.350089] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.350879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1977.351683] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 1977.355081] FAULT_INJECTION: forcing a failure. [ 1977.355081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1977.356484] CPU: 0 PID: 14272 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 1977.357246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1977.358483] Call Trace: [ 1977.358777] dump_stack+0x107/0x163 [ 1977.359181] should_fail.cold+0x5/0xa [ 1977.359609] _copy_from_user+0x2e/0x1b0 [ 1977.360063] ____sys_sendmsg+0x194/0x870 [ 1977.360518] ? kernel_sendmsg+0x50/0x50 [ 1977.360961] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1977.361473] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.361928] ? lock_downgrade+0x6d0/0x6d0 [ 1977.362388] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1977.362973] ? SOFTIRQ_verbose+0x10/0x10 [ 1977.363428] ___sys_sendmsg+0xf3/0x170 [ 1977.363872] ? sendmsg_copy_msghdr+0x160/0x160 [ 1977.364420] ? __fget_files+0x228/0x410 [ 1977.364859] ? lock_downgrade+0x6d0/0x6d0 [ 1977.365398] ? find_held_lock+0x2c/0x110 [ 1977.365934] ? __fget_files+0x251/0x410 [ 1977.366441] ? __fget_light+0xea/0x280 [ 1977.366883] __sys_sendmsg+0xe5/0x1b0 [ 1977.367318] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1977.367826] ? rcu_read_lock_any_held+0x69/0x90 [ 1977.368353] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1977.368903] do_syscall_64+0x33/0x40 [ 1977.369319] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1977.369894] RIP: 0033:0x466609 [ 1977.370258] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1977.372318] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1977.373163] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1977.373973] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1977.374766] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1977.375563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1977.376367] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:07:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb2880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 1977.534843] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1977.536039] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/266/file0 supports timestamps until 2038 (0x7fffffff) [ 1977.616246] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1977.617526] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/266/file0 supports timestamps until 2038 (0x7fffffff) 16:07:49 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:49 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000004300010100000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="1030f6ba73c4885fb22a263812fe585ddd09d11cc6be31b6219640bd702b1c7bb0a846bc53a6f9549f6b5cd4"], 0x1c}}, 0x0) r2 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r6, 0xffffffffffffffff, 0x2) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r5}, 0x0) io_uring_enter(r2, 0x76d3, 0x0, 0x0, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="28000000f703130129bd7000fedbdf2507000000070000002e2f2f66696c65300000000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) 16:07:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb3880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:49 executing program 6 (fault-call:1 fault-nth:4): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xfffffffe}, 0x0) 16:07:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfeff0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:07:49 executing program 7 (fault-call:1 fault-nth:7): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x1c}, 0x0) [ 1990.233994] FAULT_INJECTION: forcing a failure. [ 1990.233994] name failslab, interval 1, probability 0, space 0, times 0 [ 1990.234007] FAULT_INJECTION: forcing a failure. [ 1990.234007] name failslab, interval 1, probability 0, space 0, times 0 [ 1990.234023] CPU: 1 PID: 14323 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1990.237393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1990.238652] Call Trace: [ 1990.239002] dump_stack+0x107/0x163 [ 1990.239483] should_fail.cold+0x5/0xa [ 1990.239995] ? create_object.isra.0+0x3a/0xa20 [ 1990.240590] ? create_object.isra.0+0x3a/0xa20 [ 1990.241097] should_failslab+0x5/0x10 [ 1990.241592] kmem_cache_alloc+0x5b/0x350 [ 1990.242041] create_object.isra.0+0x3a/0xa20 [ 1990.242612] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1990.243163] kmem_cache_alloc_node+0x169/0x370 [ 1990.243761] __alloc_skb+0x6d/0x620 [ 1990.244180] alloc_skb_with_frags+0x92/0x570 [ 1990.244756] ? ip_route_output_key_hash+0x1a4/0x300 [ 1990.245302] ? lock_downgrade+0x6d0/0x6d0 [ 1990.245844] sock_alloc_send_pskb+0x73d/0x8a0 [ 1990.246329] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 1990.246961] ? sk_reset_timer+0xc0/0xc0 [ 1990.247389] ? lock_downgrade+0x6d0/0x6d0 [ 1990.247951] ? xfrm_lookup_route+0x65/0x1f0 [ 1990.248420] raw_sendmsg+0x13bd/0x2890 [ 1990.248931] ? usage_accumulate+0x20/0x100 [ 1990.249387] ? dst_output+0x170/0x170 [ 1990.249880] ? __lock_acquire+0x1666/0x5b20 [ 1990.250356] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1990.251038] ? SOFTIRQ_verbose+0x10/0x10 [ 1990.251492] ? lock_downgrade+0x6d0/0x6d0 [ 1990.252040] ? lock_downgrade+0x6d0/0x6d0 [ 1990.252516] ? selinux_inode_notifysecctx+0x60/0x60 [ 1990.253164] ? find_held_lock+0x2c/0x110 [ 1990.253627] ? dst_output+0x170/0x170 [ 1990.254127] inet_sendmsg+0x115/0x140 [ 1990.254546] ? inet_send_prepare+0x4f0/0x4f0 [ 1990.255120] sock_sendmsg+0x138/0x190 [ 1990.255534] ____sys_sendmsg+0x709/0x870 [ 1990.256079] ? kernel_sendmsg+0x50/0x50 [ 1990.256519] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1990.257076] ? SOFTIRQ_verbose+0x10/0x10 [ 1990.257507] ? lock_downgrade+0x6d0/0x6d0 [ 1990.257952] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1990.258510] ? SOFTIRQ_verbose+0x10/0x10 [ 1990.258953] ___sys_sendmsg+0xf3/0x170 [ 1990.259370] ? sendmsg_copy_msghdr+0x160/0x160 [ 1990.259884] ? __fget_files+0x228/0x410 [ 1990.260328] ? lock_downgrade+0x6d0/0x6d0 [ 1990.260772] ? find_held_lock+0x2c/0x110 [ 1990.261212] ? __fget_files+0x251/0x410 [ 1990.261644] ? __fget_light+0xea/0x280 [ 1990.262067] __sys_sendmsg+0xe5/0x1b0 [ 1990.262474] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1990.262934] ? rcu_read_lock_any_held+0x69/0x90 [ 1990.263449] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1990.263980] do_syscall_64+0x33/0x40 [ 1990.264378] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1990.264925] RIP: 0033:0x466609 [ 1990.265273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1990.267242] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1990.268078] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1990.268847] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1990.269618] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 1990.270385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1990.271156] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 1990.271957] CPU: 0 PID: 14322 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 1990.272766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1990.274041] Call Trace: [ 1990.274355] dump_stack+0x107/0x163 [ 1990.274779] should_fail.cold+0x5/0xa [ 1990.275209] ? dst_alloc+0x9e/0x610 [ 1990.275623] should_failslab+0x5/0x10 [ 1990.276296] kmem_cache_alloc+0x5b/0x350 [ 1990.276789] dst_alloc+0x9e/0x610 [ 1990.277197] rt_dst_alloc+0x73/0x430 [ 1990.277619] ip_route_output_key_hash_rcu+0x7ef/0x2330 [ 1990.278220] ip_route_output_key_hash+0x18d/0x300 [ 1990.278777] ? ip_route_output_key_hash_rcu+0x2330/0x2330 [ 1990.279404] ? lock_downgrade+0x6d0/0x6d0 [ 1990.279895] ? ip_cmsg_send+0x358/0x990 [ 1990.280362] ip_route_output_flow+0x23/0x150 [ 1990.280871] raw_sendmsg+0x8d3/0x2890 [ 1990.281319] ? usage_accumulate+0x20/0x100 [ 1990.281800] ? dst_output+0x170/0x170 [ 1990.282238] ? __lock_acquire+0x1666/0x5b20 [ 1990.282749] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1990.283350] ? SOFTIRQ_verbose+0x10/0x10 [ 1990.283813] ? lock_downgrade+0x6d0/0x6d0 [ 1990.284278] ? lock_downgrade+0x6d0/0x6d0 [ 1990.284758] ? selinux_inode_notifysecctx+0x60/0x60 [ 1990.285317] ? find_held_lock+0x2c/0x110 [ 1990.285789] ? dst_output+0x170/0x170 [ 1990.286239] inet_sendmsg+0x115/0x140 [ 1990.286668] ? inet_send_prepare+0x4f0/0x4f0 [ 1990.287167] sock_sendmsg+0x138/0x190 [ 1990.287600] ____sys_sendmsg+0x709/0x870 [ 1990.288089] ? kernel_sendmsg+0x50/0x50 [ 1990.288537] ? __ia32_sys_recvmmsg+0x260/0x260 [ 1990.289052] ? SOFTIRQ_verbose+0x10/0x10 [ 1990.289503] ? lock_downgrade+0x6d0/0x6d0 [ 1990.289994] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1990.290592] ? SOFTIRQ_verbose+0x10/0x10 [ 1990.291064] ___sys_sendmsg+0xf3/0x170 [ 1990.291504] ? sendmsg_copy_msghdr+0x160/0x160 [ 1990.292046] ? __fget_files+0x228/0x410 [ 1990.292494] ? lock_downgrade+0x6d0/0x6d0 [ 1990.292972] ? find_held_lock+0x2c/0x110 [ 1990.293432] ? __fget_files+0x251/0x410 [ 1990.293893] ? __fget_light+0xea/0x280 [ 1990.294339] __sys_sendmsg+0xe5/0x1b0 [ 1990.294772] ? __sys_sendmsg_sock+0xb0/0xb0 [ 1990.295256] ? rcu_read_lock_any_held+0x69/0x90 [ 1990.295800] ? rcu_read_lock_sched_held+0x3a/0x70 [ 1990.296374] do_syscall_64+0x33/0x40 [ 1990.296799] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1990.297380] RIP: 0033:0x466609 [ 1990.297747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1990.299899] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1990.300777] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1990.301580] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1990.302393] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1990.303204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1990.304045] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:07:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb4880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x24}, 0x0) 16:07:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfeffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1990.347967] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=14337 comm=syz-executor.5 [ 1990.401186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=14344 comm=syz-executor.5 16:07:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x2) 16:07:49 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', r0) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='efs\x00', 0x68058, &(0x7f00000001c0)='ext4\x00') 16:07:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x3, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:07:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb5880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:07:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x30}, 0x0) 16:07:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x3) 16:07:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xff030000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 1990.645204] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 1990.650277] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/268/file0 supports timestamps until 2038 (0x7fffffff) 16:08:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffff0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:02 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x80040, 0x40) open$dir(0x0, 0x0, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x1c) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800000, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap}, {}, {@privport}, {@privport}, {@posixacl}, {@aname={'aname', 0x3d, 'ext4\x00'}}, {@access_uid={'access', 0x3d, r2}}, {}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_type={'obj_type', 0x3d, 'G-/!(\xe0!{}'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@appraise}]}}) 16:08:02 executing program 7 (fault-call:1 fault-nth:8): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x4) 16:08:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x4, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb6880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:08:02 executing program 6 (fault-call:1 fault-nth:5): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:02 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20000220}, 0x0) 16:08:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffff7f, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 2003.713510] FAULT_INJECTION: forcing a failure. [ 2003.713510] name failslab, interval 1, probability 0, space 0, times 0 [ 2003.714864] CPU: 1 PID: 14412 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2003.715619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2003.716885] Call Trace: [ 2003.717183] dump_stack+0x107/0x163 [ 2003.717587] should_fail.cold+0x5/0xa [ 2003.718014] should_failslab+0x5/0x10 [ 2003.718436] __kmalloc_node_track_caller+0x74/0x3f0 [ 2003.718990] ? alloc_skb_with_frags+0x92/0x570 [ 2003.719510] __alloc_skb+0xb1/0x620 [ 2003.719923] alloc_skb_with_frags+0x92/0x570 [ 2003.720434] ? ip_route_output_key_hash+0x1a4/0x300 [ 2003.721001] ? lock_downgrade+0x6d0/0x6d0 [ 2003.721476] sock_alloc_send_pskb+0x73d/0x8a0 [ 2003.721977] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2003.722546] ? sk_reset_timer+0xc0/0xc0 [ 2003.723003] ? lock_downgrade+0x6d0/0x6d0 [ 2003.723466] ? xfrm_lookup_route+0x65/0x1f0 [ 2003.723953] raw_sendmsg+0x13bd/0x2890 [ 2003.724407] ? usage_accumulate+0x20/0x100 [ 2003.724896] ? dst_output+0x170/0x170 [ 2003.725321] ? __lock_acquire+0x1666/0x5b20 [ 2003.725839] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2003.726420] ? SOFTIRQ_verbose+0x10/0x10 [ 2003.726878] ? lock_downgrade+0x6d0/0x6d0 [ 2003.727335] ? lock_downgrade+0x6d0/0x6d0 [ 2003.727816] ? selinux_inode_notifysecctx+0x60/0x60 [ 2003.728384] ? find_held_lock+0x2c/0x110 [ 2003.728858] ? dst_output+0x170/0x170 [ 2003.729279] inet_sendmsg+0x115/0x140 [ 2003.729704] ? inet_send_prepare+0x4f0/0x4f0 [ 2003.730186] sock_sendmsg+0x138/0x190 [ 2003.730619] ____sys_sendmsg+0x709/0x870 [ 2003.731070] ? kernel_sendmsg+0x50/0x50 [ 2003.731514] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2003.732015] ? SOFTIRQ_verbose+0x10/0x10 [ 2003.732484] ? lock_downgrade+0x6d0/0x6d0 [ 2003.732944] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2003.733524] ? SOFTIRQ_verbose+0x10/0x10 [ 2003.733978] ___sys_sendmsg+0xf3/0x170 [ 2003.734414] ? sendmsg_copy_msghdr+0x160/0x160 [ 2003.734924] ? __fget_files+0x228/0x410 [ 2003.735366] ? lock_downgrade+0x6d0/0x6d0 [ 2003.735827] ? find_held_lock+0x2c/0x110 [ 2003.736305] ? __fget_files+0x251/0x410 [ 2003.736751] ? __fget_light+0xea/0x280 [ 2003.737193] __sys_sendmsg+0xe5/0x1b0 [ 2003.737619] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2003.738101] ? rcu_read_lock_any_held+0x69/0x90 [ 2003.738627] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2003.739173] do_syscall_64+0x33/0x40 [ 2003.739593] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2003.740184] RIP: 0033:0x466609 [ 2003.740539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2003.742566] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2003.743401] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2003.744192] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2003.744975] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2003.745757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2003.746547] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 2003.781082] FAULT_INJECTION: forcing a failure. [ 2003.781082] name failslab, interval 1, probability 0, space 0, times 0 [ 2003.782894] CPU: 0 PID: 14417 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2003.783870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2003.785523] Call Trace: [ 2003.785907] dump_stack+0x107/0x163 [ 2003.786439] should_fail.cold+0x5/0xa [ 2003.786996] ? create_object.isra.0+0x3a/0xa20 [ 2003.787663] should_failslab+0x5/0x10 [ 2003.788222] kmem_cache_alloc+0x5b/0x350 [ 2003.788817] create_object.isra.0+0x3a/0xa20 [ 2003.789472] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2003.790214] kmem_cache_alloc+0x159/0x350 [ 2003.790833] dst_alloc+0x9e/0x610 [ 2003.791350] rt_dst_alloc+0x73/0x430 [ 2003.791912] ip_route_output_key_hash_rcu+0x7ef/0x2330 [ 2003.792696] ip_route_output_key_hash+0x18d/0x300 [ 2003.793410] ? ip_route_output_key_hash_rcu+0x2330/0x2330 [ 2003.794210] ? lock_downgrade+0x6d0/0x6d0 [ 2003.794822] ? ip_cmsg_send+0x358/0x990 [ 2003.795402] ip_route_output_flow+0x23/0x150 [ 2003.796080] raw_sendmsg+0x8d3/0x2890 [ 2003.796685] ? usage_accumulate+0x20/0x100 [ 2003.797446] ? dst_output+0x170/0x170 [ 2003.797995] ? __lock_acquire+0x1666/0x5b20 [ 2003.798648] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2003.799430] ? SOFTIRQ_verbose+0x10/0x10 [ 2003.800028] ? lock_downgrade+0x6d0/0x6d0 [ 2003.800655] ? lock_downgrade+0x6d0/0x6d0 [ 2003.801281] ? selinux_inode_notifysecctx+0x60/0x60 [ 2003.802031] ? find_held_lock+0x2c/0x110 [ 2003.802645] ? dst_output+0x170/0x170 [ 2003.803214] inet_sendmsg+0x115/0x140 [ 2003.803782] ? inet_send_prepare+0x4f0/0x4f0 [ 2003.804446] sock_sendmsg+0x138/0x190 [ 2003.805006] ____sys_sendmsg+0x709/0x870 [ 2003.805613] ? kernel_sendmsg+0x50/0x50 [ 2003.806199] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2003.806878] ? SOFTIRQ_verbose+0x10/0x10 [ 2003.807480] ? lock_downgrade+0x6d0/0x6d0 [ 2003.808115] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2003.808896] ? SOFTIRQ_verbose+0x10/0x10 [ 2003.809493] ___sys_sendmsg+0xf3/0x170 [ 2003.810064] ? sendmsg_copy_msghdr+0x160/0x160 [ 2003.810746] ? __fget_files+0x228/0x410 [ 2003.811337] ? lock_downgrade+0x6d0/0x6d0 [ 2003.811955] ? find_held_lock+0x2c/0x110 [ 2003.812586] ? __fget_files+0x251/0x410 [ 2003.813180] ? __fget_light+0xea/0x280 [ 2003.813770] __sys_sendmsg+0xe5/0x1b0 [ 2003.814330] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2003.814986] ? rcu_read_lock_any_held+0x69/0x90 [ 2003.815697] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2003.816459] do_syscall_64+0x33/0x40 [ 2003.817027] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2003.817812] RIP: 0033:0x466609 [ 2003.818295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2003.821106] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2003.822262] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2003.823339] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2003.824430] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2003.825506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2003.826593] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 [ 2003.833828] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2003.835529] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/269/file0 supports timestamps until 2038 (0x7fffffff) 16:08:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb7880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:08:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x8) 16:08:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffff8c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:15 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:15 executing program 7 (fault-call:1 fault-nth:9): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:15 executing program 6 (fault-call:1 fault-nth:6): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:15 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2, 0x3}) mknodat$loop(r1, &(0x7f0000000040)='./file0\x00', 0x40, 0x1) 16:08:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x7, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2016.648890] FAULT_INJECTION: forcing a failure. [ 2016.648890] name failslab, interval 1, probability 0, space 0, times 0 [ 2016.650218] CPU: 1 PID: 14452 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2016.650992] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2016.652218] Call Trace: [ 2016.652518] dump_stack+0x107/0x163 [ 2016.652913] should_fail.cold+0x5/0xa [ 2016.653333] ? __alloc_skb+0x6d/0x620 [ 2016.653748] should_failslab+0x5/0x10 [ 2016.654156] kmem_cache_alloc_node+0x55/0x370 [ 2016.654649] __alloc_skb+0x6d/0x620 [ 2016.655044] alloc_skb_with_frags+0x92/0x570 [ 2016.655512] ? ip_route_output_key_hash+0x1a4/0x300 [ 2016.656054] ? lock_downgrade+0x6d0/0x6d0 [ 2016.656527] sock_alloc_send_pskb+0x73d/0x8a0 [ 2016.657011] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2016.657533] ? sk_reset_timer+0xc0/0xc0 [ 2016.657972] ? lock_downgrade+0x6d0/0x6d0 [ 2016.658416] ? xfrm_lookup_route+0x65/0x1f0 [ 2016.658884] raw_sendmsg+0x13bd/0x2890 [ 2016.659301] ? usage_accumulate+0x20/0x100 [ 2016.659753] ? dst_output+0x170/0x170 [ 2016.660160] ? __lock_acquire+0x1666/0x5b20 [ 2016.660642] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2016.661200] ? SOFTIRQ_verbose+0x10/0x10 [ 2016.661635] ? lock_downgrade+0x6d0/0x6d0 [ 2016.662082] ? lock_downgrade+0x6d0/0x6d0 [ 2016.662533] ? selinux_inode_notifysecctx+0x60/0x60 [ 2016.663066] ? find_held_lock+0x2c/0x110 [ 2016.663517] ? dst_output+0x170/0x170 [ 2016.663927] inet_sendmsg+0x115/0x140 [ 2016.664339] ? inet_send_prepare+0x4f0/0x4f0 [ 2016.664815] sock_sendmsg+0x138/0x190 [ 2016.665223] ____sys_sendmsg+0x709/0x870 [ 2016.665656] ? kernel_sendmsg+0x50/0x50 [ 2016.666080] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2016.666566] ? SOFTIRQ_verbose+0x10/0x10 [ 2016.667001] ? lock_downgrade+0x6d0/0x6d0 [ 2016.667448] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2016.668003] ? SOFTIRQ_verbose+0x10/0x10 [ 2016.668455] ___sys_sendmsg+0xf3/0x170 [ 2016.668877] ? sendmsg_copy_msghdr+0x160/0x160 [ 2016.669368] ? __fget_files+0x228/0x410 [ 2016.669791] ? lock_downgrade+0x6d0/0x6d0 [ 2016.670234] ? find_held_lock+0x2c/0x110 [ 2016.670671] ? __fget_files+0x251/0x410 [ 2016.671100] ? __fget_light+0xea/0x280 [ 2016.671525] __sys_sendmsg+0xe5/0x1b0 [ 2016.671931] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2016.672405] ? rcu_read_lock_any_held+0x69/0x90 [ 2016.672916] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2016.673430] do_syscall_64+0x33/0x40 [ 2016.673841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2016.674399] RIP: 0033:0x466609 [ 2016.674747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2016.676767] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2016.677583] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2016.678349] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2016.679117] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2016.679887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2016.680665] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 [ 2016.703888] FAULT_INJECTION: forcing a failure. [ 2016.703888] name failslab, interval 1, probability 0, space 0, times 0 [ 2016.705332] CPU: 0 PID: 14454 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2016.706214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2016.707449] Call Trace: [ 2016.707751] dump_stack+0x107/0x163 [ 2016.708151] should_fail.cold+0x5/0xa [ 2016.708605] ? create_object.isra.0+0x3a/0xa20 [ 2016.709120] should_failslab+0x5/0x10 [ 2016.709535] kmem_cache_alloc+0x5b/0x350 [ 2016.709996] create_object.isra.0+0x3a/0xa20 [ 2016.710476] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2016.711053] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 2016.711608] ? alloc_skb_with_frags+0x92/0x570 [ 2016.712124] __alloc_skb+0xb1/0x620 [ 2016.712540] alloc_skb_with_frags+0x92/0x570 [ 2016.713041] ? ip_route_output_key_hash+0x1a4/0x300 [ 2016.713596] ? lock_downgrade+0x6d0/0x6d0 [ 2016.714073] sock_alloc_send_pskb+0x73d/0x8a0 [ 2016.714564] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2016.715123] ? sk_reset_timer+0xc0/0xc0 [ 2016.715555] ? lock_downgrade+0x6d0/0x6d0 [ 2016.716025] ? xfrm_lookup_route+0x65/0x1f0 [ 2016.716508] raw_sendmsg+0x13bd/0x2890 [ 2016.716947] ? usage_accumulate+0x20/0x100 [ 2016.717413] ? dst_output+0x170/0x170 [ 2016.717847] ? __lock_acquire+0x1666/0x5b20 [ 2016.718323] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2016.718912] ? SOFTIRQ_verbose+0x10/0x10 [ 2016.719357] ? lock_downgrade+0x6d0/0x6d0 [ 2016.719821] ? lock_downgrade+0x6d0/0x6d0 [ 2016.720301] ? selinux_inode_notifysecctx+0x60/0x60 [ 2016.720850] ? find_held_lock+0x2c/0x110 [ 2016.721330] ? dst_output+0x170/0x170 [ 2016.721749] inet_sendmsg+0x115/0x140 [ 2016.722173] ? inet_send_prepare+0x4f0/0x4f0 [ 2016.722653] sock_sendmsg+0x138/0x190 [ 2016.723087] ____sys_sendmsg+0x709/0x870 [ 2016.723532] ? kernel_sendmsg+0x50/0x50 [ 2016.723979] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2016.724480] ? SOFTIRQ_verbose+0x10/0x10 [ 2016.724945] ? lock_downgrade+0x6d0/0x6d0 [ 2016.725399] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2016.725982] ? SOFTIRQ_verbose+0x10/0x10 [ 2016.726433] ___sys_sendmsg+0xf3/0x170 [ 2016.726877] ? sendmsg_copy_msghdr+0x160/0x160 [ 2016.727377] ? __fget_files+0x228/0x410 [ 2016.727820] ? lock_downgrade+0x6d0/0x6d0 [ 2016.728282] ? find_held_lock+0x2c/0x110 [ 2016.728749] ? __fget_files+0x251/0x410 [ 2016.729189] ? __fget_light+0xea/0x280 [ 2016.729629] __sys_sendmsg+0xe5/0x1b0 [ 2016.730057] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2016.730528] ? rcu_read_lock_any_held+0x69/0x90 [ 2016.731058] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2016.731599] do_syscall_64+0x33/0x40 [ 2016.732019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2016.732597] RIP: 0033:0x466609 [ 2016.732958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2016.734979] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2016.735844] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2016.736620] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2016.737424] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2016.738217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2016.739028] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 16:08:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb8880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2016.879021] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2016.880208] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/270/file0 supports timestamps until 2038 (0x7fffffff) 16:08:16 executing program 6 (fault-call:1 fault-nth:7): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x2}, 0x0) 16:08:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x8, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xa) 16:08:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffffe4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:16 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f00000002c0)="ee558d790a77ccc6bd8c7617a7010c5f551f26bd739e765d3ab1a0068ce9b745cc528c75316ace9962cda4e7a5a0ee8ec76368a4e01aac352772b617534a860a4228e254d05a347e920e236ec01bd9bcd2632d88254743d6a06d71c44aa336575da1debb2d05cdbc033f8f4d3df3c80888dc70c8415c8a9408d4731f74dd037d67786dbe24707d2056459c303b6fea0b1afbd19ac6b975a0969df106f15b3828bf973db5081b501778b1b497ff0b26f063befbdb26687ecf597605962d0a377e17bbf016f0f28625bbdae4a1bcea7b8e1ad727d030ba81867457cf1b24cd9ae2757f2f659d9f46d83c99c6b9c8beb162a3835914", 0xf4, 0x59db}, {&(0x7f0000000140)="b699857b4f9491b91adc0c8a364724ad776903f9e35c0e839b322bb58482e60d98a34547f35de07061d3f8577bd56719307e40fe73df6d31bd365435c4f8ea081a9fc5f6888dca78296b8811000f83da7a9fe9cb2f31af7baf3f3a2037bfbaa04bc61a9286561f63f497c2f294d3496b0c668b320b940395ff0749c418f5f2e19937", 0x82, 0x3f}], 0x0, &(0x7f0000000500)={[{@huge_within_size}, {}, {@huge_within_size}, {@huge_never}, {@uid={'uid', 0x3d, 0xee00}}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0xd065af05a9ede606, 0x35, 0x37, 0x38, 0x34, 0x35, 0x39, 0x66], 0x2d, [0x32, 0x66, 0x4, 0x38], 0x2d, [0x62, 0x61, 0x38], 0x2d, [0x37, 0x37, 0x65, 0x63], 0x2d, [0x69, 0x36, 0x38, 0x34, 0x65, 0x0, 0x31, 0x63]}}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, ']]'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@seclabel}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@smackfsdef={'smackfsdef', 0x3d, '('}}]}) getdents(r0, 0x0, 0x0) mount(&(0x7f0000000640)=@filename='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='cpuset\x00', 0x111000, &(0x7f0000000700)='func') open$dir(0x0, 0x0, 0x0) 16:08:16 executing program 7 (fault-call:1 fault-nth:10): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb9880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2017.061299] FAULT_INJECTION: forcing a failure. [ 2017.061299] name failslab, interval 1, probability 0, space 0, times 0 [ 2017.062607] CPU: 0 PID: 14491 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2017.063382] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2017.064615] Call Trace: [ 2017.064921] dump_stack+0x107/0x163 [ 2017.065330] should_fail.cold+0x5/0xa [ 2017.065760] ? create_object.isra.0+0x3a/0xa20 [ 2017.066271] should_failslab+0x5/0x10 [ 2017.066699] kmem_cache_alloc+0x5b/0x350 [ 2017.067155] create_object.isra.0+0x3a/0xa20 [ 2017.067651] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2017.068199] kmem_cache_alloc_node+0x169/0x370 [ 2017.068744] __alloc_skb+0x6d/0x620 [ 2017.069148] alloc_skb_with_frags+0x92/0x570 [ 2017.069622] ? ip_route_output_key_hash+0x1a4/0x300 [ 2017.070182] ? lock_downgrade+0x6d0/0x6d0 [ 2017.070634] sock_alloc_send_pskb+0x73d/0x8a0 [ 2017.071137] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2017.071665] ? sk_reset_timer+0xc0/0xc0 [ 2017.072109] ? lock_downgrade+0x6d0/0x6d0 [ 2017.072568] ? xfrm_lookup_route+0x65/0x1f0 [ 2017.073064] raw_sendmsg+0x13bd/0x2890 [ 2017.073497] ? usage_accumulate+0x20/0x100 [ 2017.073982] ? dst_output+0x170/0x170 [ 2017.074400] ? __lock_acquire+0x1666/0x5b20 [ 2017.074891] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2017.075473] ? SOFTIRQ_verbose+0x10/0x10 [ 2017.075927] ? lock_downgrade+0x6d0/0x6d0 [ 2017.076405] ? lock_downgrade+0x6d0/0x6d0 [ 2017.076876] ? selinux_inode_notifysecctx+0x60/0x60 [ 2017.077429] ? find_held_lock+0x2c/0x110 [ 2017.077892] ? dst_output+0x170/0x170 [ 2017.078317] inet_sendmsg+0x115/0x140 [ 2017.078739] ? inet_send_prepare+0x4f0/0x4f0 [ 2017.079223] sock_sendmsg+0x138/0x190 [ 2017.079643] ____sys_sendmsg+0x709/0x870 [ 2017.080091] ? kernel_sendmsg+0x50/0x50 [ 2017.080522] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2017.081032] ? SOFTIRQ_verbose+0x10/0x10 [ 2017.081479] ? lock_downgrade+0x6d0/0x6d0 [ 2017.081936] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2017.082515] ? SOFTIRQ_verbose+0x10/0x10 [ 2017.082964] ___sys_sendmsg+0xf3/0x170 [ 2017.083399] ? sendmsg_copy_msghdr+0x160/0x160 [ 2017.083906] ? __fget_files+0x228/0x410 [ 2017.084361] ? lock_downgrade+0x6d0/0x6d0 [ 2017.084821] ? find_held_lock+0x2c/0x110 [ 2017.085275] ? __fget_files+0x251/0x410 [ 2017.085719] ? __fget_light+0xea/0x280 [ 2017.086152] __sys_sendmsg+0xe5/0x1b0 [ 2017.086573] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2017.087052] ? rcu_read_lock_any_held+0x69/0x90 [ 2017.087578] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2017.088113] do_syscall_64+0x33/0x40 [ 2017.088519] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2017.089095] RIP: 0033:0x466609 [ 2017.089452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2017.091513] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2017.092343] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2017.093129] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2017.093927] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2017.094718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2017.095486] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:08:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0xa, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe) 16:08:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffffff6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 2017.159326] FAULT_INJECTION: forcing a failure. [ 2017.159326] name failslab, interval 1, probability 0, space 0, times 0 [ 2017.160711] CPU: 0 PID: 14503 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2017.161446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2017.162676] Call Trace: [ 2017.162964] dump_stack+0x107/0x163 [ 2017.163361] should_fail.cold+0x5/0xa [ 2017.163775] ? __skb_ext_alloc+0x19/0x80 [ 2017.164218] should_failslab+0x5/0x10 [ 2017.164650] kmem_cache_alloc+0x5b/0x350 [ 2017.165093] __skb_ext_alloc+0x19/0x80 [ 2017.165524] skb_ext_add+0x504/0x670 [ 2017.165937] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 2017.166530] __alloc_skb+0x3c1/0x620 [ 2017.166944] alloc_skb_with_frags+0x92/0x570 [ 2017.167429] ? ip_route_output_key_hash+0x1a4/0x300 [ 2017.167980] ? lock_downgrade+0x6d0/0x6d0 [ 2017.168460] sock_alloc_send_pskb+0x73d/0x8a0 [ 2017.168949] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2017.169482] ? sk_reset_timer+0xc0/0xc0 [ 2017.169923] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2017.170529] raw_sendmsg+0x13bd/0x2890 [ 2017.170960] ? usage_accumulate+0x20/0x100 [ 2017.171426] ? dst_output+0x170/0x170 [ 2017.171846] ? __lock_acquire+0x1666/0x5b20 [ 2017.172350] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2017.172918] ? SOFTIRQ_verbose+0x10/0x10 [ 2017.173366] ? lock_downgrade+0x6d0/0x6d0 [ 2017.173815] ? lock_downgrade+0x6d0/0x6d0 [ 2017.174281] ? selinux_inode_notifysecctx+0x60/0x60 [ 2017.174829] ? find_held_lock+0x2c/0x110 [ 2017.175286] ? dst_output+0x170/0x170 [ 2017.175714] inet_sendmsg+0x115/0x140 [ 2017.176134] ? inet_send_prepare+0x4f0/0x4f0 [ 2017.176623] sock_sendmsg+0x138/0x190 [ 2017.177034] ____sys_sendmsg+0x709/0x870 [ 2017.177485] ? kernel_sendmsg+0x50/0x50 [ 2017.177919] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2017.178420] ? SOFTIRQ_verbose+0x10/0x10 [ 2017.178856] ? lock_downgrade+0x6d0/0x6d0 [ 2017.179308] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2017.179877] ? SOFTIRQ_verbose+0x10/0x10 [ 2017.180336] ___sys_sendmsg+0xf3/0x170 [ 2017.180758] ? sendmsg_copy_msghdr+0x160/0x160 [ 2017.181257] ? __fget_files+0x228/0x410 [ 2017.181688] ? lock_downgrade+0x6d0/0x6d0 [ 2017.182138] ? find_held_lock+0x2c/0x110 [ 2017.182582] ? __fget_files+0x251/0x410 [ 2017.183012] ? __fget_light+0xea/0x280 [ 2017.183437] __sys_sendmsg+0xe5/0x1b0 [ 2017.183849] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2017.184318] ? rcu_read_lock_any_held+0x69/0x90 [ 2017.184838] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2017.185362] do_syscall_64+0x33/0x40 [ 2017.185771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2017.186323] RIP: 0033:0x466609 [ 2017.186674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2017.188670] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2017.189489] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2017.190267] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2017.191042] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2017.191824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2017.192604] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 2017.267756] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2017.269052] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/271/file0 supports timestamps until 2038 (0x7fffffff) 16:08:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x3}, 0x0) 16:08:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffffffe, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:29 executing program 6 (fault-call:1 fault-nth:8): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:29 executing program 7 (fault-call:1 fault-nth:11): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:29 executing program 5: r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000040)='.log\x00', 0x210002, 0xa0) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee01}}}], 0x20, 0x200000d1}, 0x40014) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r1, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:08:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x11) 16:08:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xba880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2030.046022] FAULT_INJECTION: forcing a failure. [ 2030.046022] name failslab, interval 1, probability 0, space 0, times 0 [ 2030.047326] CPU: 1 PID: 14540 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2030.048085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2030.049359] Call Trace: [ 2030.049656] dump_stack+0x107/0x163 [ 2030.050067] should_fail.cold+0x5/0xa [ 2030.050122] FAULT_INJECTION: forcing a failure. [ 2030.050122] name failslab, interval 1, probability 0, space 0, times 0 [ 2030.050504] ? create_object.isra.0+0x3a/0xa20 [ 2030.050518] should_failslab+0x5/0x10 [ 2030.052758] kmem_cache_alloc+0x5b/0x350 [ 2030.053229] create_object.isra.0+0x3a/0xa20 [ 2030.053715] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2030.054283] kmem_cache_alloc+0x159/0x350 [ 2030.054748] __skb_ext_alloc+0x19/0x80 [ 2030.055189] skb_ext_add+0x504/0x670 [ 2030.055610] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 2030.056207] __alloc_skb+0x3c1/0x620 [ 2030.056640] alloc_skb_with_frags+0x92/0x570 [ 2030.057155] ? ip_route_output_key_hash+0x1a4/0x300 [ 2030.057754] ? lock_downgrade+0x6d0/0x6d0 [ 2030.058248] sock_alloc_send_pskb+0x73d/0x8a0 [ 2030.058747] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2030.059293] ? sk_reset_timer+0xc0/0xc0 [ 2030.059746] ? lock_downgrade+0x6d0/0x6d0 [ 2030.060220] ? xfrm_lookup_route+0x65/0x1f0 [ 2030.060738] raw_sendmsg+0x13bd/0x2890 [ 2030.061193] ? usage_accumulate+0x20/0x100 [ 2030.061683] ? dst_output+0x170/0x170 [ 2030.062118] ? __lock_acquire+0x1666/0x5b20 [ 2030.062602] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.063188] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.063635] ? lock_downgrade+0x6d0/0x6d0 [ 2030.064097] ? lock_downgrade+0x6d0/0x6d0 [ 2030.064578] ? selinux_inode_notifysecctx+0x60/0x60 [ 2030.065132] ? find_held_lock+0x2c/0x110 [ 2030.065588] ? dst_output+0x170/0x170 [ 2030.066021] inet_sendmsg+0x115/0x140 [ 2030.066445] ? inet_send_prepare+0x4f0/0x4f0 [ 2030.066954] sock_sendmsg+0x138/0x190 [ 2030.067399] ____sys_sendmsg+0x709/0x870 [ 2030.067845] ? kernel_sendmsg+0x50/0x50 [ 2030.068285] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2030.068805] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.069258] ? lock_downgrade+0x6d0/0x6d0 [ 2030.069721] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.070316] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.070777] ___sys_sendmsg+0xf3/0x170 [ 2030.071232] ? sendmsg_copy_msghdr+0x160/0x160 [ 2030.071747] ? __fget_files+0x228/0x410 [ 2030.072206] ? lock_downgrade+0x6d0/0x6d0 [ 2030.072692] ? find_held_lock+0x2c/0x110 [ 2030.073169] ? __fget_files+0x251/0x410 [ 2030.073615] ? __fget_light+0xea/0x280 [ 2030.074065] __sys_sendmsg+0xe5/0x1b0 [ 2030.074498] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2030.074992] ? rcu_read_lock_any_held+0x69/0x90 [ 2030.075543] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2030.076094] do_syscall_64+0x33/0x40 [ 2030.076530] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2030.077119] RIP: 0033:0x466609 [ 2030.077484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2030.079623] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2030.080519] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2030.081329] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2030.082149] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2030.082987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2030.083817] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 2030.084687] CPU: 0 PID: 14546 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2030.085499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2030.086776] Call Trace: [ 2030.087106] dump_stack+0x107/0x163 [ 2030.087515] should_fail.cold+0x5/0xa [ 2030.087946] should_failslab+0x5/0x10 [ 2030.088372] __kmalloc_node_track_caller+0x74/0x3f0 [ 2030.088951] ? alloc_skb_with_frags+0x92/0x570 [ 2030.089480] __alloc_skb+0xb1/0x620 [ 2030.089891] alloc_skb_with_frags+0x92/0x570 [ 2030.090381] ? ip_route_output_key_hash+0x1a4/0x300 [ 2030.090943] ? lock_downgrade+0x6d0/0x6d0 [ 2030.091430] sock_alloc_send_pskb+0x73d/0x8a0 [ 2030.091948] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2030.092518] ? sk_reset_timer+0xc0/0xc0 [ 2030.092972] ? lock_downgrade+0x6d0/0x6d0 [ 2030.093440] ? xfrm_lookup_route+0x65/0x1f0 [ 2030.093932] raw_sendmsg+0x13bd/0x2890 [ 2030.094555] ? usage_accumulate+0x20/0x100 [ 2030.095050] ? dst_output+0x170/0x170 [ 2030.095477] ? __lock_acquire+0x1666/0x5b20 [ 2030.095969] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.096585] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.097034] ? lock_downgrade+0x6d0/0x6d0 [ 2030.097494] ? lock_downgrade+0x6d0/0x6d0 [ 2030.097970] ? selinux_inode_notifysecctx+0x60/0x60 [ 2030.098521] ? find_held_lock+0x2c/0x110 [ 2030.099003] ? dst_output+0x170/0x170 [ 2030.099434] inet_sendmsg+0x115/0x140 [ 2030.099856] ? inet_send_prepare+0x4f0/0x4f0 [ 2030.100343] sock_sendmsg+0x138/0x190 [ 2030.100794] ____sys_sendmsg+0x709/0x870 [ 2030.101249] ? kernel_sendmsg+0x50/0x50 [ 2030.101692] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2030.102199] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.102656] ? lock_downgrade+0x6d0/0x6d0 [ 2030.103135] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.103730] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.104189] ___sys_sendmsg+0xf3/0x170 [ 2030.104664] ? sendmsg_copy_msghdr+0x160/0x160 [ 2030.105180] ? __fget_files+0x228/0x410 [ 2030.105628] ? lock_downgrade+0x6d0/0x6d0 [ 2030.106090] ? find_held_lock+0x2c/0x110 [ 2030.106563] ? __fget_files+0x251/0x410 [ 2030.107027] ? __fget_light+0xea/0x280 [ 2030.107512] __sys_sendmsg+0xe5/0x1b0 [ 2030.107947] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2030.108437] ? rcu_read_lock_any_held+0x69/0x90 [ 2030.108994] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2030.109550] do_syscall_64+0x33/0x40 [ 2030.109974] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2030.110569] RIP: 0033:0x466609 [ 2030.110930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2030.113056] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2030.113940] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2030.114759] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2030.115608] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2030.116398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2030.117241] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:08:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x2, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbb880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:08:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2084ffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:29 executing program 7 (fault-call:1 fault-nth:12): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:29 executing program 6 (fault-call:1 fault-nth:9): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2030.180103] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2030.182051] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/272/file0 supports timestamps until 2038 (0x7fffffff) 16:08:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x4}, 0x0) [ 2030.287267] FAULT_INJECTION: forcing a failure. [ 2030.287267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2030.288677] CPU: 0 PID: 14576 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2030.289467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2030.290793] Call Trace: [ 2030.291132] dump_stack+0x107/0x163 [ 2030.291639] should_fail.cold+0x5/0xa [ 2030.292184] _copy_from_iter_full+0x1ff/0x940 [ 2030.292763] ? __check_object_size+0x319/0x440 [ 2030.293308] raw_sendmsg+0x17ee/0x2890 [ 2030.293765] ? dst_output+0x170/0x170 [ 2030.294213] ? __lock_acquire+0x1666/0x5b20 [ 2030.294722] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.295329] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.295770] ? lock_downgrade+0x6d0/0x6d0 [ 2030.296233] ? lock_downgrade+0x6d0/0x6d0 [ 2030.296734] ? selinux_inode_notifysecctx+0x60/0x60 [ 2030.297284] ? find_held_lock+0x2c/0x110 [ 2030.297768] ? dst_output+0x170/0x170 [ 2030.298238] inet_sendmsg+0x115/0x140 [ 2030.298676] ? inet_send_prepare+0x4f0/0x4f0 [ 2030.299191] sock_sendmsg+0x138/0x190 [ 2030.299628] ____sys_sendmsg+0x709/0x870 [ 2030.300101] ? kernel_sendmsg+0x50/0x50 [ 2030.300576] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2030.301116] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.301591] ? lock_downgrade+0x6d0/0x6d0 [ 2030.302083] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.302680] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.303157] ___sys_sendmsg+0xf3/0x170 [ 2030.303581] ? sendmsg_copy_msghdr+0x160/0x160 [ 2030.304108] ? __fget_files+0x228/0x410 [ 2030.304563] ? lock_downgrade+0x6d0/0x6d0 [ 2030.305053] ? find_held_lock+0x2c/0x110 [ 2030.305644] ? __fget_files+0x251/0x410 [ 2030.306142] ? __fget_light+0xea/0x280 [ 2030.306589] __sys_sendmsg+0xe5/0x1b0 [ 2030.307022] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2030.307521] ? rcu_read_lock_any_held+0x69/0x90 [ 2030.308043] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2030.308600] do_syscall_64+0x33/0x40 [ 2030.309011] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2030.309575] RIP: 0033:0x466609 [ 2030.309924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2030.311969] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2030.312833] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2030.313624] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2030.314406] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2030.315190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2030.315968] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 2030.320011] FAULT_INJECTION: forcing a failure. [ 2030.320011] name failslab, interval 1, probability 0, space 0, times 0 [ 2030.321341] CPU: 1 PID: 14579 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2030.322121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2030.323394] Call Trace: [ 2030.323697] dump_stack+0x107/0x163 [ 2030.324104] should_fail.cold+0x5/0xa [ 2030.324546] ? create_object.isra.0+0x3a/0xa20 [ 2030.325055] should_failslab+0x5/0x10 [ 2030.325484] kmem_cache_alloc+0x5b/0x350 [ 2030.325945] create_object.isra.0+0x3a/0xa20 [ 2030.326434] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2030.326998] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 2030.327561] ? alloc_skb_with_frags+0x92/0x570 [ 2030.328071] __alloc_skb+0xb1/0x620 [ 2030.328475] alloc_skb_with_frags+0x92/0x570 [ 2030.328972] ? ip_route_output_key_hash+0x1a4/0x300 [ 2030.329527] ? lock_downgrade+0x6d0/0x6d0 [ 2030.329994] sock_alloc_send_pskb+0x73d/0x8a0 [ 2030.330494] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2030.331031] ? sk_reset_timer+0xc0/0xc0 [ 2030.331469] ? lock_downgrade+0x6d0/0x6d0 [ 2030.331936] ? xfrm_lookup_route+0x65/0x1f0 [ 2030.332426] raw_sendmsg+0x13bd/0x2890 [ 2030.332881] ? usage_accumulate+0x20/0x100 [ 2030.333353] ? dst_output+0x170/0x170 [ 2030.333773] ? __lock_acquire+0x1666/0x5b20 [ 2030.334261] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.334846] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.335314] ? lock_downgrade+0x6d0/0x6d0 [ 2030.335780] ? lock_downgrade+0x6d0/0x6d0 [ 2030.336255] ? selinux_inode_notifysecctx+0x60/0x60 [ 2030.336815] ? find_held_lock+0x2c/0x110 [ 2030.337296] ? dst_output+0x170/0x170 [ 2030.337722] inet_sendmsg+0x115/0x140 [ 2030.338135] ? inet_send_prepare+0x4f0/0x4f0 [ 2030.338621] sock_sendmsg+0x138/0x190 [ 2030.339046] ____sys_sendmsg+0x709/0x870 [ 2030.339495] ? kernel_sendmsg+0x50/0x50 [ 2030.339934] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2030.340439] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.340897] ? lock_downgrade+0x6d0/0x6d0 [ 2030.341351] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2030.341925] ? SOFTIRQ_verbose+0x10/0x10 [ 2030.342376] ___sys_sendmsg+0xf3/0x170 [ 2030.342811] ? sendmsg_copy_msghdr+0x160/0x160 [ 2030.343317] ? __fget_files+0x228/0x410 [ 2030.343758] ? lock_downgrade+0x6d0/0x6d0 [ 2030.344246] ? find_held_lock+0x2c/0x110 [ 2030.344720] ? __fget_files+0x251/0x410 [ 2030.345160] ? __fget_light+0xea/0x280 [ 2030.345597] __sys_sendmsg+0xe5/0x1b0 [ 2030.346018] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2030.346496] ? rcu_read_lock_any_held+0x69/0x90 [ 2030.347023] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2030.347556] do_syscall_64+0x33/0x40 [ 2030.347972] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2030.348549] RIP: 0033:0x466609 [ 2030.348906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2030.350948] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2030.351788] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2030.352587] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2030.353375] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2030.354165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2030.354957] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:08:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xedc000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:42 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x18) 16:08:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbc880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:08:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x8}, 0x0) 16:08:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x3, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:42 executing program 6 (fault-call:1 fault-nth:10): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:42 executing program 7 (fault-call:1 fault-nth:13): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:42 executing program 5: r0 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18, 0xf, 0x1, {{0x80, 0x2, 0x4}, 0x7}}, 0x18) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r1, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) [ 2043.017799] FAULT_INJECTION: forcing a failure. [ 2043.017799] name failslab, interval 1, probability 0, space 0, times 0 [ 2043.019100] CPU: 1 PID: 14607 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2043.019875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2043.021173] Call Trace: [ 2043.021474] dump_stack+0x107/0x163 [ 2043.021895] should_fail.cold+0x5/0xa [ 2043.022328] ? lock_release+0x6b0/0x6b0 [ 2043.022778] ? skb_clone+0x14f/0x3c0 [ 2043.023200] should_failslab+0x5/0x10 [ 2043.023639] kmem_cache_alloc+0x5b/0x350 [ 2043.024113] ? find_held_lock+0x2c/0x110 [ 2043.024587] skb_clone+0x14f/0x3c0 [ 2043.025006] dev_queue_xmit_nit+0x3a7/0xad0 [ 2043.025504] dev_hard_start_xmit+0xab/0x840 [ 2043.026000] __dev_queue_xmit+0x17da/0x27d0 [ 2043.026493] ? find_held_lock+0x2c/0x110 [ 2043.026967] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 2043.027490] ? lock_downgrade+0x6d0/0x6d0 [ 2043.027955] ? find_held_lock+0x2c/0x110 [ 2043.028431] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2043.029046] ip_finish_output2+0xe0e/0x2070 [ 2043.029538] ? ip_frag_next+0x9e0/0x9e0 [ 2043.029985] ? nf_hook+0x160/0x4a0 [ 2043.030364] ? __ip_finish_output.part.0+0xb50/0xb50 [ 2043.030913] __ip_finish_output.part.0+0x5e8/0xb50 [ 2043.031473] ? ip_fragment.constprop.0+0x240/0x240 [ 2043.032036] ? raw_sendmsg+0x1e81/0x2890 [ 2043.032522] ? lock_downgrade+0x6d0/0x6d0 16:08:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2043.033170] ip_output+0x2f3/0x600 [ 2043.033715] raw_sendmsg+0x1b58/0x2890 [ 2043.034321] ? dst_output+0x170/0x170 [ 2043.034764] ? __lock_acquire+0x1666/0x5b20 [ 2043.035335] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2043.036101] ? raw_recvmsg+0x790/0x790 [ 2043.036548] ? selinux_inode_notifysecctx+0x60/0x60 [ 2043.037274] ? find_held_lock+0x2c/0x110 [ 2043.037823] ? dst_output+0x170/0x170 [ 2043.038316] inet_sendmsg+0x115/0x140 [ 2043.038900] ? inet_send_prepare+0x4f0/0x4f0 [ 2043.039412] sock_sendmsg+0x138/0x190 [ 2043.039913] ____sys_sendmsg+0x709/0x870 [ 2043.040528] ? kernel_sendmsg+0x50/0x50 [ 2043.041003] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2043.041652] ? SOFTIRQ_verbose+0x10/0x10 [ 2043.042257] ? lock_downgrade+0x6d0/0x6d0 [ 2043.042702] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2043.043443] ? SOFTIRQ_verbose+0x10/0x10 [ 2043.043986] ___sys_sendmsg+0xf3/0x170 [ 2043.044415] ? sendmsg_copy_msghdr+0x160/0x160 [ 2043.045073] ? __fget_files+0x228/0x410 [ 2043.045645] ? lock_downgrade+0x6d0/0x6d0 [ 2043.046087] ? find_held_lock+0x2c/0x110 [ 2043.046556] ? __fget_files+0x251/0x410 [ 2043.047099] ? __fget_light+0xea/0x280 [ 2043.047658] __sys_sendmsg+0xe5/0x1b0 [ 2043.048062] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2043.048534] ? rcu_read_lock_any_held+0x69/0x90 [ 2043.049049] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2043.049572] do_syscall_64+0x33/0x40 [ 2043.049970] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2043.050518] RIP: 0033:0x466609 [ 2043.050879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2043.052837] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2043.053719] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2043.054477] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2043.055285] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2043.056103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2043.056920] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 [ 2043.063086] FAULT_INJECTION: forcing a failure. [ 2043.063086] name failslab, interval 1, probability 0, space 0, times 0 [ 2043.064346] CPU: 0 PID: 14609 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2043.065118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2043.066353] Call Trace: [ 2043.066646] dump_stack+0x107/0x163 [ 2043.067047] should_fail.cold+0x5/0xa [ 2043.067464] ? __skb_ext_alloc+0x19/0x80 [ 2043.067911] should_failslab+0x5/0x10 [ 2043.068332] kmem_cache_alloc+0x5b/0x350 [ 2043.068794] __skb_ext_alloc+0x19/0x80 [ 2043.069218] skb_ext_add+0x504/0x670 [ 2043.069620] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 2043.070189] __alloc_skb+0x3c1/0x620 [ 2043.070595] alloc_skb_with_frags+0x92/0x570 [ 2043.071070] ? ip_route_output_key_hash+0x1a4/0x300 [ 2043.071615] ? lock_downgrade+0x6d0/0x6d0 [ 2043.072072] sock_alloc_send_pskb+0x73d/0x8a0 [ 2043.072560] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2043.073108] ? sk_reset_timer+0xc0/0xc0 [ 2043.073537] ? lock_downgrade+0x6d0/0x6d0 [ 2043.073990] ? xfrm_lookup_route+0x65/0x1f0 [ 2043.074459] raw_sendmsg+0x13bd/0x2890 [ 2043.074882] ? usage_accumulate+0x20/0x100 [ 2043.075340] ? dst_output+0x170/0x170 [ 2043.075750] ? __lock_acquire+0x1666/0x5b20 [ 2043.076226] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2043.076820] ? SOFTIRQ_verbose+0x10/0x10 [ 2043.077257] ? lock_downgrade+0x6d0/0x6d0 [ 2043.077704] ? lock_downgrade+0x6d0/0x6d0 [ 2043.078163] ? selinux_inode_notifysecctx+0x60/0x60 [ 2043.078701] ? find_held_lock+0x2c/0x110 [ 2043.079150] ? dst_output+0x170/0x170 [ 2043.079566] inet_sendmsg+0x115/0x140 [ 2043.079978] ? inet_send_prepare+0x4f0/0x4f0 [ 2043.080453] sock_sendmsg+0x138/0x190 [ 2043.080880] ____sys_sendmsg+0x709/0x870 [ 2043.081324] ? kernel_sendmsg+0x50/0x50 [ 2043.081753] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2043.082248] ? SOFTIRQ_verbose+0x10/0x10 [ 2043.082687] ? lock_downgrade+0x6d0/0x6d0 [ 2043.083137] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2043.083703] ? SOFTIRQ_verbose+0x10/0x10 [ 2043.084145] ___sys_sendmsg+0xf3/0x170 [ 2043.084572] ? sendmsg_copy_msghdr+0x160/0x160 [ 2043.085155] ? __fget_files+0x228/0x410 [ 2043.085586] ? lock_downgrade+0x6d0/0x6d0 [ 2043.086034] ? find_held_lock+0x2c/0x110 [ 2043.086480] ? __fget_files+0x251/0x410 [ 2043.086914] ? __fget_light+0xea/0x280 [ 2043.087342] __sys_sendmsg+0xe5/0x1b0 [ 2043.087753] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2043.088219] ? rcu_read_lock_any_held+0x69/0x90 [ 2043.088754] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2043.089282] do_syscall_64+0x33/0x40 [ 2043.089688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2043.090245] RIP: 0033:0x466609 [ 2043.090596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2043.092586] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2043.093675] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2043.095347] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2043.097066] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2043.098786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2043.100503] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 [ 2043.117772] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2043.118945] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/273/file0 supports timestamps until 2038 (0x7fffffff) 16:08:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xa}, 0x0) 16:08:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbd880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:08:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:42 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x60) 16:08:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe}, 0x0) 16:08:55 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1f4) 16:08:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000000040)="2000000000020003649dc3aa2d99c7aa24fa0019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b000000806e2eb56966a95325dd7e274ec2", 0x71, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x2}, {&(0x7f0000000140)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="154eed41000000040000ddf4655fdef4655fdef46597b60000000000f1", 0x1d, 0x1480}, {&(0x7f0000000180)="504d4d005281fc75a57bc4834d4dff", 0xf, 0x10000}], 0x328800, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:08:55 executing program 6 (fault-call:1 fault-nth:11): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:55 executing program 7 (fault-call:1 fault-nth:14): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbe880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2056.019192] FAULT_INJECTION: forcing a failure. [ 2056.019192] name failslab, interval 1, probability 0, space 0, times 0 [ 2056.020345] FAULT_INJECTION: forcing a failure. [ 2056.020345] name failslab, interval 1, probability 0, space 0, times 0 [ 2056.021009] CPU: 0 PID: 14661 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2056.023332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2056.025115] Call Trace: [ 2056.025500] dump_stack+0x107/0x163 [ 2056.026090] should_fail.cold+0x5/0xa [ 2056.026682] ? create_object.isra.0+0x3a/0xa20 [ 2056.027389] should_failslab+0x5/0x10 [ 2056.027964] kmem_cache_alloc+0x5b/0x350 [ 2056.028579] create_object.isra.0+0x3a/0xa20 [ 2056.029261] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2056.030016] kmem_cache_alloc+0x159/0x350 [ 2056.030657] __skb_ext_alloc+0x19/0x80 [ 2056.031255] skb_ext_add+0x504/0x670 [ 2056.031785] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 2056.032586] __alloc_skb+0x3c1/0x620 [ 2056.033162] alloc_skb_with_frags+0x92/0x570 [ 2056.033837] ? ip_route_output_key_hash+0x1a4/0x300 [ 2056.034577] ? lock_downgrade+0x6d0/0x6d0 [ 2056.035189] sock_alloc_send_pskb+0x73d/0x8a0 [ 2056.035876] ? xfrm_lookup_with_ifid+0x996/0x1d40 [ 2056.036606] ? sk_reset_timer+0xc0/0xc0 [ 2056.037223] ? lock_downgrade+0x6d0/0x6d0 [ 2056.037831] ? xfrm_lookup_route+0x65/0x1f0 [ 2056.038468] raw_sendmsg+0x13bd/0x2890 [ 2056.039052] ? usage_accumulate+0x20/0x100 [ 2056.039658] ? dst_output+0x170/0x170 [ 2056.040225] ? __lock_acquire+0x1666/0x5b20 [ 2056.040865] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2056.041674] ? SOFTIRQ_verbose+0x10/0x10 [ 2056.042271] ? lock_downgrade+0x6d0/0x6d0 [ 2056.042872] ? lock_downgrade+0x6d0/0x6d0 [ 2056.043513] ? selinux_inode_notifysecctx+0x60/0x60 [ 2056.044240] ? find_held_lock+0x2c/0x110 [ 2056.044870] ? dst_output+0x170/0x170 [ 2056.045464] inet_sendmsg+0x115/0x140 [ 2056.046022] ? inet_send_prepare+0x4f0/0x4f0 [ 2056.046690] sock_sendmsg+0x138/0x190 [ 2056.047241] ____sys_sendmsg+0x709/0x870 [ 2056.047879] ? kernel_sendmsg+0x50/0x50 [ 2056.048465] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2056.049196] ? SOFTIRQ_verbose+0x10/0x10 [ 2056.049799] ? lock_downgrade+0x6d0/0x6d0 [ 2056.050447] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2056.051239] ? SOFTIRQ_verbose+0x10/0x10 [ 2056.051859] ___sys_sendmsg+0xf3/0x170 [ 2056.052478] ? sendmsg_copy_msghdr+0x160/0x160 [ 2056.053172] ? __fget_files+0x228/0x410 [ 2056.053788] ? lock_downgrade+0x6d0/0x6d0 [ 2056.054426] ? find_held_lock+0x2c/0x110 [ 2056.055041] ? __fget_files+0x251/0x410 [ 2056.055663] ? __fget_light+0xea/0x280 [ 2056.056243] __sys_sendmsg+0xe5/0x1b0 [ 2056.056831] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2056.057490] ? rcu_read_lock_any_held+0x69/0x90 [ 2056.058226] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2056.058989] do_syscall_64+0x33/0x40 [ 2056.059539] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2056.060345] RIP: 0033:0x466609 [ 2056.060823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2056.063659] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2056.064818] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2056.065926] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2056.067023] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2056.068111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2056.069219] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 [ 2056.070345] CPU: 1 PID: 14663 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2056.071165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2056.072706] Call Trace: [ 2056.073044] dump_stack+0x107/0x163 [ 2056.073459] should_fail.cold+0x5/0xa [ 2056.073898] ? create_object.isra.0+0x3a/0xa20 [ 2056.074411] should_failslab+0x5/0x10 [ 2056.074841] kmem_cache_alloc+0x5b/0x350 [ 2056.075301] ? lock_acquire+0x197/0x490 [ 2056.075753] create_object.isra.0+0x3a/0xa20 [ 2056.076355] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2056.076999] kmem_cache_alloc+0x159/0x350 [ 2056.077635] skb_clone+0x14f/0x3c0 [ 2056.078186] dev_queue_xmit_nit+0x3a7/0xad0 [ 2056.078735] dev_hard_start_xmit+0xab/0x840 [ 2056.079382] __dev_queue_xmit+0x17da/0x27d0 [ 2056.079918] ? find_held_lock+0x2c/0x110 [ 2056.080488] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 2056.081217] ? lock_downgrade+0x6d0/0x6d0 [ 2056.081832] ? find_held_lock+0x2c/0x110 [ 2056.082293] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2056.082982] ip_finish_output2+0xe0e/0x2070 [ 2056.083478] ? ip_frag_next+0x9e0/0x9e0 [ 2056.084031] ? nf_hook+0x160/0x4a0 [ 2056.084509] ? __ip_finish_output.part.0+0xb50/0xb50 [ 2056.085233] __ip_finish_output.part.0+0x5e8/0xb50 [ 2056.085787] ? ip_fragment.constprop.0+0x240/0x240 [ 2056.086344] ? raw_sendmsg+0x1e81/0x2890 [ 2056.086915] ? lock_downgrade+0x6d0/0x6d0 [ 2056.087377] ip_output+0x2f3/0x600 [ 2056.087894] raw_sendmsg+0x1b58/0x2890 [ 2056.088410] ? dst_output+0x170/0x170 [ 2056.088979] ? __lock_acquire+0x1666/0x5b20 [ 2056.089462] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2056.090058] ? raw_recvmsg+0x790/0x790 [ 2056.090508] ? selinux_inode_notifysecctx+0x60/0x60 [ 2056.091074] ? find_held_lock+0x2c/0x110 [ 2056.091696] ? dst_output+0x170/0x170 [ 2056.092128] inet_sendmsg+0x115/0x140 [ 2056.092554] ? inet_send_prepare+0x4f0/0x4f0 [ 2056.093132] sock_sendmsg+0x138/0x190 [ 2056.093647] ____sys_sendmsg+0x709/0x870 [ 2056.094268] ? kernel_sendmsg+0x50/0x50 [ 2056.094721] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2056.095243] ? SOFTIRQ_verbose+0x10/0x10 [ 2056.095714] ? lock_downgrade+0x6d0/0x6d0 [ 2056.096285] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2056.096882] ? SOFTIRQ_verbose+0x10/0x10 [ 2056.097343] ___sys_sendmsg+0xf3/0x170 [ 2056.097801] ? sendmsg_copy_msghdr+0x160/0x160 [ 2056.098472] ? __fget_files+0x228/0x410 [ 2056.099098] ? lock_downgrade+0x6d0/0x6d0 [ 2056.099568] ? find_held_lock+0x2c/0x110 [ 2056.100033] ? __fget_files+0x251/0x410 [ 2056.100487] ? __fget_light+0xea/0x280 [ 2056.100950] __sys_sendmsg+0xe5/0x1b0 [ 2056.101380] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2056.101865] ? rcu_read_lock_any_held+0x69/0x90 [ 2056.102397] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2056.102944] do_syscall_64+0x33/0x40 [ 2056.103382] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2056.103965] RIP: 0033:0x466609 [ 2056.104330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2056.106371] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2056.107230] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2056.108173] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2056.109170] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2056.110044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2056.110836] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 16:08:55 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x11, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x11}, 0x0) 16:08:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x300) 16:08:55 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x5, 0x28c403) getdents64(r1, &(0x7f00000002c0)=""/4096, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r2, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x2, 0x3}) getdents64(r3, &(0x7f0000000080)=""/117, 0x75) 16:08:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbf880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:08:55 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x300, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:08:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x100000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:08:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc0880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2056.358310] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2056.359674] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/275/file0 supports timestamps until 2038 (0x7fffffff) 16:08:55 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x18}, 0x0) 16:08:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x3e8) 16:09:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRESOCT=r0]) getdents(r1, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:09:13 executing program 7 (fault-call:1 fault-nth:15): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xa00) 16:09:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x200000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:09:13 executing program 6 (fault-call:1 fault-nth:12): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa00, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc0ed0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:09:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x60}, 0x0) [ 2074.094756] FAULT_INJECTION: forcing a failure. [ 2074.094756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2074.096123] CPU: 0 PID: 14739 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2074.096895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2074.098190] Call Trace: [ 2074.098490] dump_stack+0x107/0x163 [ 2074.098910] should_fail.cold+0x5/0xa [ 2074.099349] _copy_from_iter_full+0x1ff/0x940 [ 2074.099855] ? __check_object_size+0x319/0x440 [ 2074.100381] raw_sendmsg+0x17ee/0x2890 [ 2074.100830] ? dst_output+0x170/0x170 [ 2074.101287] ? __lock_acquire+0x1666/0x5b20 [ 2074.101781] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.102373] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.102831] ? lock_downgrade+0x6d0/0x6d0 [ 2074.103298] ? lock_downgrade+0x6d0/0x6d0 [ 2074.103789] ? selinux_inode_notifysecctx+0x60/0x60 [ 2074.103873] FAULT_INJECTION: forcing a failure. [ 2074.103873] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.104350] ? find_held_lock+0x2c/0x110 [ 2074.104373] ? dst_output+0x170/0x170 [ 2074.104383] inet_sendmsg+0x115/0x140 [ 2074.104400] ? inet_send_prepare+0x4f0/0x4f0 [ 2074.108625] sock_sendmsg+0x138/0x190 [ 2074.109054] ____sys_sendmsg+0x709/0x870 [ 2074.109534] ? kernel_sendmsg+0x50/0x50 [ 2074.109981] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2074.110501] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.110959] ? lock_downgrade+0x6d0/0x6d0 [ 2074.111428] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.112020] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.112484] ___sys_sendmsg+0xf3/0x170 [ 2074.112923] ? sendmsg_copy_msghdr+0x160/0x160 [ 2074.113459] ? __fget_files+0x228/0x410 [ 2074.113908] ? lock_downgrade+0x6d0/0x6d0 [ 2074.114378] ? find_held_lock+0x2c/0x110 [ 2074.114847] ? __fget_files+0x251/0x410 [ 2074.115300] ? __fget_light+0xea/0x280 [ 2074.115745] __sys_sendmsg+0xe5/0x1b0 [ 2074.116178] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2074.116667] ? rcu_read_lock_any_held+0x69/0x90 [ 2074.117200] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2074.117772] do_syscall_64+0x33/0x40 [ 2074.118196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2074.118777] RIP: 0033:0x466609 [ 2074.119146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.121253] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2074.122114] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2074.122923] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2074.123729] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.124537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2074.125366] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 [ 2074.126206] CPU: 1 PID: 14741 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2074.127885] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2074.130604] Call Trace: [ 2074.131284] dump_stack+0x107/0x163 [ 2074.132147] should_fail.cold+0x5/0xa [ 2074.133245] ? lock_downgrade+0x6d0/0x6d0 [ 2074.134224] ? skb_clone+0x14f/0x3c0 [ 2074.135166] should_failslab+0x5/0x10 [ 2074.136149] kmem_cache_alloc+0x5b/0x350 [ 2074.137162] skb_clone+0x14f/0x3c0 [ 2074.138034] packet_rcv+0xe41/0x1400 [ 2074.138961] ? run_filter+0x470/0x470 [ 2074.139894] dev_queue_xmit_nit+0x38b/0xad0 [ 2074.141011] dev_hard_start_xmit+0xab/0x840 [ 2074.141984] __dev_queue_xmit+0x17da/0x27d0 [ 2074.142951] ? find_held_lock+0x2c/0x110 [ 2074.143851] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 2074.144853] ? lock_downgrade+0x6d0/0x6d0 [ 2074.145754] ? find_held_lock+0x2c/0x110 [ 2074.146650] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2074.147817] ip_finish_output2+0xe0e/0x2070 [ 2074.148756] ? ip_frag_next+0x9e0/0x9e0 [ 2074.149635] ? nf_hook+0x160/0x4a0 [ 2074.150416] ? __ip_finish_output.part.0+0xb50/0xb50 [ 2074.151509] __ip_finish_output.part.0+0x5e8/0xb50 [ 2074.152568] ? ip_fragment.constprop.0+0x240/0x240 [ 2074.153637] ? raw_sendmsg+0x1e81/0x2890 [ 2074.154525] ? lock_downgrade+0x6d0/0x6d0 [ 2074.155441] ip_output+0x2f3/0x600 [ 2074.156225] raw_sendmsg+0x1b58/0x2890 [ 2074.157086] ? dst_output+0x170/0x170 [ 2074.157933] ? __lock_acquire+0x1666/0x5b20 [ 2074.158910] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.160052] ? raw_recvmsg+0x790/0x790 [ 2074.160927] ? selinux_inode_notifysecctx+0x60/0x60 [ 2074.162025] ? find_held_lock+0x2c/0x110 [ 2074.162952] ? dst_output+0x170/0x170 [ 2074.163772] inet_sendmsg+0x115/0x140 [ 2074.164596] ? inet_send_prepare+0x4f0/0x4f0 [ 2074.165564] sock_sendmsg+0x138/0x190 [ 2074.166396] ____sys_sendmsg+0x709/0x870 [ 2074.167294] ? kernel_sendmsg+0x50/0x50 [ 2074.168164] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2074.169162] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.170070] ? lock_downgrade+0x6d0/0x6d0 [ 2074.170986] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.172114] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.173000] ___sys_sendmsg+0xf3/0x170 [ 2074.173863] ? sendmsg_copy_msghdr+0x160/0x160 [ 2074.174871] ? __fget_files+0x228/0x410 [ 2074.175724] ? lock_downgrade+0x6d0/0x6d0 [ 2074.176625] ? find_held_lock+0x2c/0x110 [ 2074.177541] ? __fget_files+0x251/0x410 [ 2074.178419] ? __fget_light+0xea/0x280 [ 2074.179287] __sys_sendmsg+0xe5/0x1b0 [ 2074.180115] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2074.181047] ? rcu_read_lock_any_held+0x69/0x90 [ 2074.182100] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2074.183148] do_syscall_64+0x33/0x40 [ 2074.183973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2074.185081] RIP: 0033:0x466609 [ 2074.185790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.189801] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2074.191449] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2074.193010] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2074.194569] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.196128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2074.197692] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 16:09:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe00) [ 2074.241892] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2074.287161] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:09:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc1880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:09:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1100, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:13 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000000c700000020", 0x9, 0x560}, {&(0x7f0000000040)="03400000040063d8968c372228b0893dbda2000005", 0x15, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x20000, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:09:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1100) 16:09:13 executing program 6 (fault-call:1 fault-nth:13): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1f4}, 0x0) 16:09:13 executing program 7 (fault-call:1 fault-nth:16): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2074.624988] FAULT_INJECTION: forcing a failure. [ 2074.624988] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.627239] CPU: 1 PID: 14776 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2074.628530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2074.630674] Call Trace: [ 2074.631172] dump_stack+0x107/0x163 [ 2074.631863] should_fail.cold+0x5/0xa [ 2074.632582] ? skb_clone+0x14f/0x3c0 [ 2074.633286] should_failslab+0x5/0x10 [ 2074.634005] kmem_cache_alloc+0x5b/0x350 [ 2074.634207] FAULT_INJECTION: forcing a failure. [ 2074.634207] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.634764] ? find_held_lock+0x2c/0x110 [ 2074.634785] skb_clone+0x14f/0x3c0 [ 2074.634807] dev_queue_xmit_nit+0x3a7/0xad0 [ 2074.638713] dev_hard_start_xmit+0xab/0x840 [ 2074.639541] __dev_queue_xmit+0x17da/0x27d0 [ 2074.640354] ? find_held_lock+0x2c/0x110 [ 2074.641138] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 2074.642020] ? lock_downgrade+0x6d0/0x6d0 [ 2074.642806] ? find_held_lock+0x2c/0x110 [ 2074.643579] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2074.644603] ip_finish_output2+0xe0e/0x2070 [ 2074.645438] ? ip_frag_next+0x9e0/0x9e0 [ 2074.646189] ? nf_hook+0x160/0x4a0 [ 2074.646859] ? __ip_finish_output.part.0+0xb50/0xb50 [ 2074.647824] __ip_finish_output.part.0+0x5e8/0xb50 [ 2074.648748] ? ip_fragment.constprop.0+0x240/0x240 [ 2074.649693] ? raw_sendmsg+0x1e81/0x2890 [ 2074.650451] ? lock_downgrade+0x6d0/0x6d0 [ 2074.651242] ip_output+0x2f3/0x600 [ 2074.651916] raw_sendmsg+0x1b58/0x2890 [ 2074.652665] ? dst_output+0x170/0x170 [ 2074.653391] ? __lock_acquire+0x1666/0x5b20 [ 2074.654226] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.655216] ? raw_recvmsg+0x790/0x790 [ 2074.655967] ? selinux_inode_notifysecctx+0x60/0x60 [ 2074.656897] ? find_held_lock+0x2c/0x110 [ 2074.657715] ? dst_output+0x170/0x170 [ 2074.658441] inet_sendmsg+0x115/0x140 [ 2074.659159] ? inet_send_prepare+0x4f0/0x4f0 [ 2074.659987] sock_sendmsg+0x138/0x190 [ 2074.660707] ____sys_sendmsg+0x709/0x870 [ 2074.661490] ? kernel_sendmsg+0x50/0x50 [ 2074.662237] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2074.663103] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.663884] ___sys_sendmsg+0xf3/0x170 [ 2074.664622] ? sendmsg_copy_msghdr+0x160/0x160 [ 2074.665509] ? __fget_files+0x228/0x410 [ 2074.666259] ? lock_downgrade+0x6d0/0x6d0 [ 2074.667048] ? finish_task_switch+0x126/0x5d0 [ 2074.667894] ? lock_downgrade+0x6d0/0x6d0 [ 2074.668678] ? __fget_files+0x251/0x410 [ 2074.669461] ? __fget_light+0xea/0x280 [ 2074.670200] __sys_sendmsg+0xe5/0x1b0 [ 2074.670923] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2074.671750] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2074.672667] do_syscall_64+0x33/0x40 [ 2074.673376] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2074.674349] RIP: 0033:0x466609 [ 2074.674956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.678452] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2074.679885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2074.681242] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2074.682587] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.683924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2074.685269] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 [ 2074.686656] CPU: 0 PID: 14780 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 2074.687861] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2074.689747] Call Trace: [ 2074.690196] dump_stack+0x107/0x163 [ 2074.690810] should_fail.cold+0x5/0xa [ 2074.691449] ? create_object.isra.0+0x3a/0xa20 [ 2074.692215] should_failslab+0x5/0x10 [ 2074.692848] kmem_cache_alloc+0x5b/0x350 [ 2074.693556] create_object.isra.0+0x3a/0xa20 [ 2074.694139] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2074.694729] kmem_cache_alloc+0x159/0x350 [ 2074.695217] skb_clone+0x14f/0x3c0 [ 2074.695637] packet_rcv+0xe41/0x1400 [ 2074.696065] ? run_filter+0x470/0x470 [ 2074.696500] dev_queue_xmit_nit+0x38b/0xad0 [ 2074.696999] dev_hard_start_xmit+0xab/0x840 [ 2074.697514] __dev_queue_xmit+0x17da/0x27d0 [ 2074.698012] ? find_held_lock+0x2c/0x110 [ 2074.698484] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 2074.699013] ? lock_downgrade+0x6d0/0x6d0 [ 2074.699494] ? find_held_lock+0x2c/0x110 [ 2074.699964] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2074.700567] ip_finish_output2+0xe0e/0x2070 [ 2074.701050] ? ip_frag_next+0x9e0/0x9e0 [ 2074.701513] ? nf_hook+0x160/0x4a0 [ 2074.701922] ? __ip_finish_output.part.0+0xb50/0xb50 [ 2074.702497] __ip_finish_output.part.0+0x5e8/0xb50 [ 2074.703063] ? ip_fragment.constprop.0+0x240/0x240 [ 2074.703620] ? raw_sendmsg+0x1e81/0x2890 [ 2074.704082] ? lock_downgrade+0x6d0/0x6d0 [ 2074.704558] ip_output+0x2f3/0x600 [ 2074.704971] raw_sendmsg+0x1b58/0x2890 [ 2074.705438] ? dst_output+0x170/0x170 [ 2074.705876] ? __lock_acquire+0x1666/0x5b20 [ 2074.706360] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.706967] ? raw_recvmsg+0x790/0x790 [ 2074.707407] ? selinux_inode_notifysecctx+0x60/0x60 [ 2074.707979] ? find_held_lock+0x2c/0x110 [ 2074.708451] ? dst_output+0x170/0x170 [ 2074.708898] inet_sendmsg+0x115/0x140 [ 2074.709357] ? inet_send_prepare+0x4f0/0x4f0 [ 2074.709870] sock_sendmsg+0x138/0x190 [ 2074.710316] ____sys_sendmsg+0x709/0x870 [ 2074.710777] ? kernel_sendmsg+0x50/0x50 [ 2074.711236] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2074.711765] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.712225] ? lock_downgrade+0x6d0/0x6d0 [ 2074.712703] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2074.713311] ? SOFTIRQ_verbose+0x10/0x10 [ 2074.713776] ___sys_sendmsg+0xf3/0x170 [ 2074.714209] ? sendmsg_copy_msghdr+0x160/0x160 [ 2074.714741] ? __fget_files+0x228/0x410 [ 2074.715192] ? lock_downgrade+0x6d0/0x6d0 [ 2074.715665] ? find_held_lock+0x2c/0x110 [ 2074.716133] ? __fget_files+0x251/0x410 [ 2074.716577] ? __fget_light+0xea/0x280 [ 2074.717031] __sys_sendmsg+0xe5/0x1b0 [ 2074.717465] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2074.717954] ? rcu_read_lock_any_held+0x69/0x90 [ 2074.718486] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2074.719042] do_syscall_64+0x33/0x40 [ 2074.719473] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2074.720068] RIP: 0033:0x466609 [ 2074.720439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.722567] RSP: 002b:00007f6c47153188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2074.723424] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2074.724219] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2074.725012] RBP: 00007f6c471531d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.725817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2074.726610] R13: 00007ffed4b5abef R14: 00007f6c47153300 R15: 0000000000022000 16:09:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x400000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:09:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1800) 16:09:14 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x300}, 0x0) 16:09:14 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') open$dir(0x0, 0x0, 0x0) [ 2074.876740] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2074.878200] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/278/file0 supports timestamps until 2038 (0x7fffffff) 16:09:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc2880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:09:32 executing program 7 (fault-call:1 fault-nth:17): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:32 executing program 6 (fault-call:1 fault-nth:14): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x3e8}, 0x0) 16:09:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000002}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:32 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x8}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:09:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x6000) 16:09:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x700000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 2093.607471] FAULT_INJECTION: forcing a failure. [ 2093.607471] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.608742] CPU: 0 PID: 14813 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 2093.609482] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2093.610753] Call Trace: [ 2093.611049] dump_stack+0x107/0x163 [ 2093.611453] should_fail.cold+0x5/0xa [ 2093.611875] ? ___slab_alloc+0x151/0x700 [ 2093.612325] ? create_object.isra.0+0x3a/0xa20 [ 2093.612837] should_failslab+0x5/0x10 [ 2093.613262] kmem_cache_alloc+0x5b/0x350 [ 2093.613733] ? lock_acquire+0x197/0x490 [ 2093.614165] create_object.isra.0+0x3a/0xa20 [ 2093.614652] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 2093.615198] kmem_cache_alloc+0x159/0x350 [ 2093.615652] skb_clone+0x14f/0x3c0 [ 2093.616040] dev_queue_xmit_nit+0x3a7/0xad0 [ 2093.616515] dev_hard_start_xmit+0xab/0x840 [ 2093.616989] __dev_queue_xmit+0x17da/0x27d0 [ 2093.617468] ? find_held_lock+0x2c/0x110 [ 2093.617916] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 2093.618413] ? lock_downgrade+0x6d0/0x6d0 [ 2093.618878] ? find_held_lock+0x2c/0x110 [ 2093.619318] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2093.619895] ip_finish_output2+0xe0e/0x2070 [ 2093.620374] ? ip_frag_next+0x9e0/0x9e0 [ 2093.620816] ? nf_hook+0x160/0x4a0 [ 2093.621208] ? __ip_finish_output.part.0+0xb50/0xb50 [ 2093.621777] __ip_finish_output.part.0+0x5e8/0xb50 [ 2093.622314] ? ip_fragment.constprop.0+0x240/0x240 [ 2093.622852] ? raw_sendmsg+0x1e81/0x2890 [ 2093.623309] ? lock_downgrade+0x6d0/0x6d0 [ 2093.623777] ip_output+0x2f3/0x600 [ 2093.624172] raw_sendmsg+0x1b58/0x2890 [ 2093.624602] ? dst_output+0x170/0x170 [ 2093.625023] ? __lock_acquire+0x1666/0x5b20 [ 2093.625509] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.626102] ? raw_recvmsg+0x790/0x790 [ 2093.626538] ? selinux_inode_notifysecctx+0x60/0x60 [ 2093.627087] ? find_held_lock+0x2c/0x110 [ 2093.627550] ? dst_output+0x170/0x170 [ 2093.627973] inet_sendmsg+0x115/0x140 [ 2093.628392] ? inet_send_prepare+0x4f0/0x4f0 [ 2093.628882] sock_sendmsg+0x138/0x190 [ 2093.629296] ____sys_sendmsg+0x709/0x870 [ 2093.629752] ? kernel_sendmsg+0x50/0x50 [ 2093.630191] ? __ia32_sys_recvmmsg+0x260/0x260 [ 2093.630702] ? SOFTIRQ_verbose+0x10/0x10 [ 2093.631148] ? lock_downgrade+0x6d0/0x6d0 [ 2093.631627] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2093.632210] ? SOFTIRQ_verbose+0x10/0x10 [ 2093.632661] ___sys_sendmsg+0xf3/0x170 [ 2093.633097] ? sendmsg_copy_msghdr+0x160/0x160 [ 2093.633632] ? __fget_files+0x228/0x410 [ 2093.634066] ? lock_downgrade+0x6d0/0x6d0 [ 2093.634521] ? find_held_lock+0x2c/0x110 [ 2093.634987] ? __fget_files+0x251/0x410 [ 2093.635434] ? __fget_light+0xea/0x280 [ 2093.635871] __sys_sendmsg+0xe5/0x1b0 [ 2093.636293] ? __sys_sendmsg_sock+0xb0/0xb0 [ 2093.636775] ? rcu_read_lock_any_held+0x69/0x90 [ 2093.637300] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2093.637849] do_syscall_64+0x33/0x40 [ 2093.638258] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2093.638822] RIP: 0033:0x466609 [ 2093.639182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2093.641231] RSP: 002b:00007f524d90d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2093.642086] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 2093.642872] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 2093.643662] RBP: 00007f524d90d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2093.644453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2093.645237] R13: 00007ffc87d986ff R14: 00007f524d90d300 R15: 0000000000022000 16:09:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000003}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe803) 16:09:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc3880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2093.750228] EXT4-fs (loop5): unsupported descriptor size 0 16:09:33 executing program 6 (fault-call:1 fault-nth:15): r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2093.792397] EXT4-fs (loop5): unsupported descriptor size 0 16:09:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc4880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:09:33 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xa00}, 0x0) 16:09:33 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000008}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000040)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="0010011e6cbb0000", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:09:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000011}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe00}, 0x0) 16:09:52 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:52 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x3, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xf401) 16:09:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x800000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:09:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc5880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2113.072019] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 64 16:09:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1100}, 0x0) 16:09:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc6880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2113.099276] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 64 16:09:52 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x4, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe00000bb}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:09:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x900000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:09:52 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x3, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x4, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:10:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000300}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2, 0x3}) getdents(r1, &(0x7f0000000040)=""/92, 0x5c) open$dir(0x0, 0x0, 0x0) 16:10:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc7880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:10:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1800}, 0x0) 16:10:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x7, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x34000) 16:10:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x8, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2132.065215] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2132.066336] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/281/file0 supports timestamps until 2038 (0x7fffffff) 16:10:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x6000}, 0x0) 16:10:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x7, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe000bb00}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0xa, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000024c0)='cpuset.effective_mems\x00', 0x0, 0x0) lseek(r1, 0x8, 0x4) open$dir(0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000180)='./file1\x00', 0x2, 0x4, &(0x7f0000000380)=[{&(0x7f00000004c0)="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", 0x1000, 0x1}, {&(0x7f00000002c0)="71a076dfbc014d3b16e999c6a9eb7b8adf635a0024fe520a699c5d2a2835bd7d480d5463c1f4128b1fd125a58f6cb81c024d9ba3ecb23378df6530699808d9423089ffdae9881ea7b1ed41f3e34ef7fe441c9c88262a5bbc0ad993be61bb2fe3b3ac1d13be1138ce1dbe99f51b7d2be44b571d9e71142c3fb6b3895df516a5ae81ee3f54654edfc487ae2cbe95b20c6e933b46aedfc422a42aaa44912ddc3eaa73331c6482fe04a63ace5380de8f", 0xae, 0x3ff}, {&(0x7f00000001c0)="b15334a29c2fe3f78dc3369780a65deb80d92fdc000ee73f53925274d7b2da9bf6fed9d140133aaae1769aefc31dfc2fd579", 0x32, 0x7fff}, {&(0x7f00000014c0)="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", 0x1000, 0xffffffffffff6d06}], 0x4000, &(0x7f0000000400)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_never}, {@huge_advise}], [{@fsname={'fsname', 0x3d, '!).'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r2, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x2, 0x3}) fchownat(r3, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xee00, 0x400) chmod(&(0x7f0000000040)='./file0\x00', 0x20) [ 2132.347852] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2132.349001] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/282/file0 supports timestamps until 2038 (0x7fffffff) 16:10:31 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x400300) 16:10:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe803}, 0x0) 16:10:31 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x138, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0), 0x0, 0x5}, {&(0x7f0000000140)="761955942d092be62a43da92c07a2ced951ec087a82b367be5392b82337a40713905a27a15297ea796f150d52e10c91d9d1260329ecd8261b1c819a017a620bb719c7b1781aee000f89e421b957f42eb07397a5d30cbc094a2f1144a76aece7235f3169ef4f8929f8d9fdcedeee04f1b4a8e55e22295a81c50189ea0240322d265c5563e293baafedc8e", 0x8a, 0xffffffffffffff7f}, {&(0x7f00000002c0)="230980aac6c795e7f9c77d5392b5e9fdd2a18ede4c3dbd8737cdc7cfb5410c4c9b4defa6a4bbaa47f9", 0x29, 0x5}], 0x20000, &(0x7f0000000380)={[{@delalloc}, {@jqfmt_vfsv1}, {@nouid32}, {@user_xattr}], [{@audit}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x37, 0x66, 0x37, 0x33, 0x33, 0x64, 0x34], 0x2d, [0x30, 0x66, 0x63, 0x35], 0x2d, [0x37, 0x66, 0x39, 0x36], 0x2d, [0x61, 0x66, 0x31, 0x38], 0x2d, [0x34, 0x30, 0x66, 0x34, 0x35, 0x39, 0x32, 0x39]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, '-'}}, {@permit_directio}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}]}) open$dir(0x0, 0x0, 0x0) 16:10:31 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:31 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x8, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:10:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0xf, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc8880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:10:31 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x2, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xf401}, 0x0) 16:10:31 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0xa, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:10:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200000d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2152.308330] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2152.311008] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/283/file0 supports timestamps until 2038 (0x7fffffff) 16:10:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc9880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:10:48 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x34000}, 0x0) 16:10:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:10:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xca880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:10:48 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x3, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1000000) 16:10:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000900)={0x14, r1, 0x480d00ac4110a7d7, 0x0, 0x0, {{0x15}}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x8c, r1, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x2}, @NL80211_ATTR_REG_RULES={0x58, 0x22, 0x0, 0x1, [{0x4}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0xd482}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x6}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x4}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0xffff1eaa}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x8}]}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x20004045) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="01000000000005004065076cc670e4d85f7a4aa0bf986a1d9dff0d6f807eb81559f0e4ce9493eba6fdfba971323dcee81b51923e1e6cf1938e8e3b03c12f4ba9d45ee14ea7573eea6fc39281c5ab496a611f9da3569bc19259dd48bfe435534a792426b5f1bf810e05b404eadf3d755d1920e2ec76f231db6e8136851a73f698922aefe0a8912d461f4e9954fc3a59c33716379fd1f0731d73c246b32493e8872e6f9c37b129c9900fb77e2eef74a975258bc7563475edebd35773b15ac4034de2267d", 0xc3, 0x560}, {&(0x7f00000003c0)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1490}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r2, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000500), &(0x7f0000000540)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000580)="c9771a7b9d3e4d614074900facb6bdd918134fd0a9569c075baf67924d0440d770b793c4b9e40a2b4b9284a222e80912cdf9cab33972fb09b88249585ae71c7cdcef22694f8583b419b720d5ea937067d83e53595eaa2b715068373d30b5973707a997ceb8bda8515d775b15e770", 0x6e, 0x8001}], 0x0, &(0x7f0000000640)={[{@nodots}, {@dots}, {@dots}, {@dots}], [{@fsname={'fsname', 0x3d, 'nl80211\x00'}}, {@dont_hash}]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xa84041, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x2, 0x3}) getdents64(r3, &(0x7f0000000400)=""/250, 0xfa) 16:10:48 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200001d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:49 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2169.764492] EXT4-fs (loop5): Unrecognized mount option ".oœ7±)É·~.ït©u%‹ÇV4uíëÓWs±ZÄMâ&}" or missing value [ 2169.765743] EXT4-fs (loop5): failed to parse options in superblock: .oœ7±)É·~.ït©u%‹ÇV4uíëÓWs±ZÄMâ&} [ 2169.771279] EXT4-fs warning (device loop5): ext4_multi_mount_protect:291: Invalid MMP block in superblock 16:10:49 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x2, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2169.808072] FAT-fs (loop5): Unrecognized mount option "fsname=nl80211" or missing value 16:10:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcb880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:10:49 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x400300}, 0x0) 16:10:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x2000000) 16:10:49 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000, 0x45) 16:10:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:10:49 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:49 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x3, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:10:49 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2170.095319] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2170.096399] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/285/file0 supports timestamps until 2038 (0x7fffffff) 16:11:08 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcc880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:11:08 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x3000000) 16:11:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:11:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x1000000}, 0x0) 16:11:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa085e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='mqueue\x00', 0x80044, &(0x7f00000002c0)='ext4\x00') syz_mount_image$ext4(&(0x7f0000000300)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x6, 0x5, &(0x7f0000000740)=[{&(0x7f0000000380)="9bbeed78b0b7bf626a77326d24cfa385477292ef0701d95d0c0d8f85ba948942bc09e2071508e55ab3f90baa3cf1a2d30ef6db09235654545db83fc7f5ce3125d7fb33c4263de4bb52b8a7f7ca9da0dc1d0e3db2aae52499c4830da99a2619f78b177185341078d876d3011725d07e4ecb11bb8e1aeb379cdeda38e80f1c1dc7a746adbf47bb094ac4400d9eb74cdb0bfb7a5f6a21af07c1ca99e4cd0b13e476e9266e1ef89011afd2463ef112f9de2a3858c51f998457dbb702b3e68897e888a03985c8f113ba697bd6d15315509cd064", 0xd1, 0x20}, {&(0x7f0000000480)="3458880aca49ffff780f58a1bc1a87da44b3a608b75b8f802958e5a88b6a49bdc785acf03738c3c4f965bd50c9897a8c665e5d25f3966b4ca15e08b110356ffbf89268bddf129e2bfb3ffc6305a5efd37915efa4b1a62f628c0825332753242b1486477a3f031482", 0x68}, {&(0x7f0000000500)="71070f714b6a39808663c5122b7ebb2b094c6cb0afa7cb28b092e0d492ee3766bd4ec1e20d2122af0d60cadf1b2cf5b565f56b66ab53336782329179ad5b9f751d2e9247ba488e180f7eeaf0fc5241516dd8dc5774f42c6972d5745292f1b67097583ef2ddc8a95f6487a95b", 0x6c, 0x8}, {&(0x7f0000000580)="7894e1bd4832a94582de314b44360004baffb068a6a40af2b5940beaf3198c3320211a7017d91839757e87e54eaacb191c763c7558bed52792386b04746132d37674a940e8324f752db3f2d81156ad3c05b6ec992cc5337edd7a7279df16b8363c54ddec0ed728cfab95cf2aa38b57a88e4aca6c55a0e71149a67eb979fcaa29d8", 0x81, 0x80bf}, {&(0x7f0000000640)="0a3b996721c7353ac11b856c070cc1ab2640bdb6c9921d06f76eff137dd18ee9325e77703c5334ee3dbb9f9ae2aeeffb44f64308566c4fdd2c921576d2c476dfefc010325d087e612a438c56e7ce01b957b4e5236179e020894cd4a528d4b8a4faf964a27af851123ba7257f59772bb6397e40f3650bd453c0d1e9bbb9d418045940d04f52f6e3accf04c0c430ba7a10267d1e1021d7c757af536451aebfdecf2b01b8447ffc2d15ea76433ae87c40527e3278d62c01ed259cc7dcceb8a3e73d4ab25345cd559e", 0xc7, 0xdc}], 0xe685e38ebc8fdb35, &(0x7f00000007c0)={[{@debug}, {@usrquota}, {@journal_path={'journal_path', 0x3d, './file0'}}], [{@measure}, {@appraise}]}) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:11:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x13}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:08 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x11, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:08 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2189.325619] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2189.327076] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/286/file0 supports timestamps until 2038 (0x7fffffff) 16:11:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcd880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:11:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x4000000) 16:11:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x2000000}, 0x0) 16:11:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:11:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6b88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:11:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x3000000}, 0x0) 16:11:27 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:27 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x20000018}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:27 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x18, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xce880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:11:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x8000000) 16:11:27 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000140)={&(0x7f00000002c0)=""/233, 0xe9}) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r1, 0x0, 0x0) r2 = dup3(r1, r1, 0x80000) getdents64(r2, &(0x7f0000000040)=""/89, 0x59) open$dir(0x0, 0x0, 0x0) 16:11:27 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x7ffff000}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xa000000) 16:11:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6c88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:11:27 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x60, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2208.001437] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:11:27 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2208.003766] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/287/file0 supports timestamps until 2038 (0x7fffffff) 16:11:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x4000000}, 0x0) 16:11:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xcf880000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:11:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0xfffffdef}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xe4ffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:11:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6d88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:11:47 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1f4, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000140)="030000000400000005cfbe9c0c93e4b12f4231fcfd6e2a5ec4566fccb261a7ec12e6d0a68fe4ae4665155122c37ac3cd87fa1248ae927487402300862e8361219bc8d7e6cacd6a4fa6294b2f01953a728c59ef2d541066ca6965df672d3e54", 0x5f, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000000000)="ed4100000000000000f4655fdef4655fdef4655f0000000000000400aa", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x4000, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001540)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x800, 0xfffffffa, 0x3, 0x2b0, 0x100000000, 0x3f}, {0x7fffffff, 0x1, 0x3, 0x8000, 0x3, 0x9b2}], ['\x00', '\x00', '\x00']}) sendmsg(r2, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) recvmsg(r2, &(0x7f00000001c0)={&(0x7f00000002c0)=@xdp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/65, 0x41}, {&(0x7f0000000440)=""/226, 0xe2}], 0x3, &(0x7f0000000540)=""/4096, 0x1000}, 0x163) openat(r0, &(0x7f0000000040)='./file0\x00', 0x680000, 0x10) 16:11:47 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x11, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x8000000}, 0x0) 16:11:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe000000) 16:11:47 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x300, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2228.328151] EXT4-fs (loop5): couldn't mount as ext2 due to feature incompatibilities 16:11:47 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x18, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:11:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xf5ffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:11:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x11000000) [ 2228.384345] EXT4-fs (loop5): couldn't mount as ext2 due to feature incompatibilities 16:11:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xa000000}, 0x0) 16:11:47 executing program 5: ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={0x0, 0x5}) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000000)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:11:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xf6ffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2228.663803] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2228.664924] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/289/file0 supports timestamps until 2038 (0x7fffffff) 16:12:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0/../file0\x00') open$dir(0x0, 0x0, 0x0) 16:12:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x3, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfdffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:12:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x18000000) 16:12:06 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x3e8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:06 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x60, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6e88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:12:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe000000}, 0x0) 16:12:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfeff0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:12:06 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1f4, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x8, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x60000000) 16:12:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x11000000}, 0x0) 16:12:06 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa00, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6f88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 2247.500800] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2247.501904] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/290/file0 supports timestamps until 2038 (0x7fffffff) 16:12:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@initdev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @local}}}}, &(0x7f00000001c0)=0xe8) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x2000000, &(0x7f00000004c0)={'trans=unix,', {[{@version_L}, {@access_client}, {@cache_none}, {@cache_fscache}, {@access_any}], [{@hash}, {@hash}, {@audit}, {@obj_role={'obj_role', 0x3d, '.)'}}, {@euid_gt={'euid>', r1}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@uid_eq={'uid', 0x3d, r5}}]}}) getdents(r0, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x1c, 0x43, 0x101, 0x0, 0x0, {}, [@typed={0x8, 0x1, 0x0, 0x0, @pid}]}, 0x1c}}, 0x0) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) openat2(r0, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x2100, 0x1d4}, 0x18) sendmmsg$inet(r8, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0x2}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r10], 0x38}}], 0x1, 0x8080) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000640)={'sit0\x00', &(0x7f00000005c0)={'ip6tnl0\x00', r2, 0x2f, 0x3f, 0xff, 0xe6, 0x74, @mcast2, @loopback, 0x8, 0x7, 0x8, 0x5}}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r6, &(0x7f0000000800)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000680)={0x10c, r7, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xff}, @ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7}, @ETHTOOL_A_LINKINFO_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x5b}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}]}, 0x10c}, 0x1, 0x0, 0x0, 0x800}, 0x40010) open$dir(0x0, 0x0, 0x0) [ 2247.750345] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2247.752824] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/291/file0 supports timestamps until 2038 (0x7fffffff) 16:12:25 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x300, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:25 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x11, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:25 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x800, 0x4) 16:12:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7088000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:12:25 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe00, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe8030000) 16:12:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x18000000}, 0x0) 16:12:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfeffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:12:25 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x3e8, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xf4010000) 16:12:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xff030000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:12:26 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7188000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 2266.766113] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2266.767313] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/292/file0 supports timestamps until 2038 (0x7fffffff) 16:12:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0x60000000}, 0x0) 16:12:26 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1100, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:26 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xa00, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffff0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:12:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x6}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) [ 2267.026547] EXT4-fs (loop5): unsupported descriptor size 0 [ 2267.060985] EXT4-fs (loop5): unsupported descriptor size 0 16:12:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xfeffffff) 16:12:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7288000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:12:46 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000000080)="000000000000000000001100e58ca12e13a240e2b1a22f8d07e8e55f010040aa4a0b89dfc3755b84feda46bdb186df81aa65ae89cb65889707eb5b18550c9fd78905e085c27247fc26346fd1275342c4489f885f4d7f6d53759dea8ec9eb25b35f0bd30125db61f6380e037b6da59e65d7a3bb5f2b", 0x75, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:12:46 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe00, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffff7f, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:12:46 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1800, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:12:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xe8030000}, 0x0) 16:12:46 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x300, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2287.446277] EXT4-fs (loop5): unsupported descriptor size 43584 [ 2287.479517] EXT4-fs (loop5): unsupported descriptor size 43584 16:13:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb00, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f00000000c0)=[{&(0x7f00000002c0)="2025d4750bbc184a12c125e2519a87a79bf6d593de6a2940632cc8f27f3ddd612c55fdc5f67e70e0d02e03270a1d1a10fb60f3898b333903f4b76e598e97c4e618125a8caea97af0551a945c14079fe134fe280e34c000c707e8abd9f235948e29218a10965987e0911899db044fb04257c9642473f78ccf6399086d4b35a0a53756389b5cadfb1df8aebcbafbdd23f017282336242f65ee9a7334190477b8f7a7d9c3937bd10dc5fbca5113ead43801336d95731c924c1e18691402fb0ae9166279c3b0306817ec6baa8e37a856c3f9e6002e0b01db28ea5daac9ae0252783bafb448c4b7d4671aa27e9b66", 0xec, 0x7fffffff}], 0x2003, &(0x7f0000000140)={[{'ext4\x00'}, {}, {'ext4\x00'}, {'@'}, {'ext4\x00'}, {'&'}, {'ext4\x00'}, {'ext4\x00'}], [{@obj_role={'obj_role', 0x3d, '<'}}, {@hash}, {@smackfsdef={'smackfsdef', 0x3d, 'ext4\x00'}}, {@dont_measure}]}) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000540)=0x6e) getdents64(r1, &(0x7f00000003c0)=""/249, 0xf9) openat(r1, &(0x7f00000001c0)='./file0/file0\x00', 0x240102, 0x111) open$dir(0x0, 0x200000, 0x0) 16:13:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xfffffffe) 16:13:08 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x6000, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:08 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1100, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffff8c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:13:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xf4010000}, 0x0) 16:13:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7388000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:13:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffff97, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2308.932402] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2308.933615] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/295/file0 supports timestamps until 2038 (0x7fffffff) 16:13:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0xf, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x40030000000000) 16:13:08 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x840000, &(0x7f0000000140)='\x00') 16:13:08 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe803, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:08 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x1800, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:08 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xfeffffff}, 0x0) 16:13:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffffe4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:13:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7488000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:13:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7588000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 2309.184520] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2309.186813] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/296/file0 supports timestamps until 2038 (0x7fffffff) 16:13:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffffff5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:13:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7688000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:13:27 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x9}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) open$dir(0x0, 0x0, 0x0) 16:13:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x100000000000000) 16:13:27 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x6000, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:27 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xf401, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20, 0xfffffffe}, 0x0) 16:13:27 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x2, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7788000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:13:27 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000002}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2328.111021] EXT4-fs (loop5): couldn't mount as ext3 due to feature incompatibilities [ 2328.157141] EXT4-fs (loop5): couldn't mount as ext3 due to feature incompatibilities 16:13:27 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:27 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xe803, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffffff6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:13:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x200000000000000) 16:13:27 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x2) 16:13:27 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/33) getdents64(r0, &(0x7f0000000040)=""/46, 0x2e) open$dir(0x0, 0x0, 0x169) 16:13:27 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000003}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:27 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x8, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2328.674150] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2328.676308] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/298/file0 supports timestamps until 2038 (0x7fffffff) 16:13:47 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0xf401, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffffffd, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:13:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x300000000000000) 16:13:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x3) 16:13:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7888000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:13:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d4dff004000", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r1 = fork() move_pages(r1, 0x0, 0x0, &(0x7f0000000880), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x5, 0xd5, 0x2, 0x7, 0x0, 0x8, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x4100, 0x1fffe00000, 0x10000, 0x9, 0x3, 0x670, 0x6, 0x0, 0x10000, 0x0, 0xffffffff}, r1, 0x2, 0xffffffffffffffff, 0x1) 16:13:47 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000004}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2347.867601] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 64 16:13:47 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000002}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffffffe, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:13:47 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000008}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x11, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2347.958610] EXT4-fs warning (device loop5): read_mmp_block:106: Error -117 while reading MMP block 64 16:13:47 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x4) 16:13:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x400000000000000) 16:13:47 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000003}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:13:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7988000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:13:47 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x1}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7f16c6b2, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000140)="c5842ab32232214dddf8936ab2547203d00c00269ed2c797d8a81382c1673be3e419f3c63154bd4c9a5dea5e82b0918f06c2851cd3a88610c61242a929637ab8c0", 0x41, 0x87}, {&(0x7f00000002c0)="b54ccac60a55a3ff16a4beea53fcadd7e1705f4527c2bf31ffef0f294ecd564c87bdadc7a94a601e85a6c6297e24d82f728a7646ca3fa3a3e136c2aac50d181268e4770e0fe18584ff08a55f06f3bd515a7754680929", 0x56, 0x3}, {&(0x7f00000000c0)="52654e0dae767d9a395ae9918dd10641f1405af156d59dbe3e45263899e5", 0x1e, 0x3f}, {&(0x7f0000000340)="ff22878645ad6a83b3329741cc1c332d7a1624daa73198c43b545e979fd074bfba864530adbf04e53c42d648dd8f9114ed2626cece1f81113e80d65fdb0178cb08649fb0735a66ef45f98773e89dc582afaa94805defdb02105cce07a0eef09d35fc", 0x62, 0x80}], 0x1002000, &(0x7f0000000440)={[{@huge_advise}, {@huge_always}, {@huge_advise}, {@huge_never}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@huge_never}], [{@euid_lt={'euid<', 0xee01}}, {@audit}, {@obj_type}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}, {@permit_directio}, {@dont_hash}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@appraise}]}) open$dir(0x0, 0x0, 0x0) 16:13:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2084ffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:13:47 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000008}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2348.193875] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2348.237235] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:14:06 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x440, &(0x7f0000012b00)=ANY=[]) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)={0x0, 0xfb, 0x45, 0x0, 0x6f, "ef9839794da460525f3f3e2ae329c6b7", "c4a9a25a5fda62fe9e3af7f8fb2fba992833dbb6899786f443e86173f5b526e5c4d7cdb61385b9c8e43832844e4978c4"}, 0x45, 0x0) getdents(r0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000340)=[{&(0x7f00000002c0)="705e03265613a369cab17f44b1c64a39146f06d8de55cfc6a4e197344107fe7da3c1a9ed7487c2aa621e6d3bd844960c7e1b039b9d5cf1b287b4b7fca917bf95abbc8c09f54b3aa2645e57614df6fd7ea6e23d9e93105af7ffcaf0b72f004053576f6ba9f654b3099538399745ea71e7fc7ecec033d28af3ef27f644c1", 0x7d, 0xfffffffffffffb9b}], 0x18924c0, &(0x7f0000000380)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@seclabel}, {@appraise_type}, {@obj_user={'obj_user', 0x3d, 'trusted.overlay.upper\x00'}}]}) open$dir(0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2, 0x3}) getdents64(r2, &(0x7f0000000500)=""/196, 0xc4) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg(r3, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) dup3(0xffffffffffffffff, r3, 0x0) openat(r0, &(0x7f0000000600)='./file0\x00', 0x200, 0xc0) mount(&(0x7f0000000400)=@sg0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='devpts\x00', 0x20000, &(0x7f00000004c0)='\'\x00') r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640), 0x100, 0x0) openat(r4, &(0x7f0000000680)='./file0\x00', 0x2, 0x0) 16:14:06 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000011}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xedc000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:14:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x800000000000000) 16:14:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x300, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7a88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:14:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x8) 16:14:06 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000011}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:07 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe00000bb}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:14:07 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xa) [ 2367.902221] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2367.903918] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/301/file0 supports timestamps until 2038 (0x7fffffff) 16:14:25 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe00000bb}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7b88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:14:25 executing program 5: write$sndseq(0xffffffffffffffff, &(0x7f00000001c0)=[{0x4, 0x8, 0x5, 0xf9, @tick=0x4, {0x0, 0x4}, {0x3, 0x1}, @ext={0x26, &(0x7f0000000180)="d943191c2364456e7b77feea550042dcc57264ec8a7a9027ddaac22be7d0fec8df1214c4f3b4"}}], 0x1c) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x30c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x80, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4d3}]}]}, @TIPC_NLA_NODE={0x10c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "807e1b6e520a13d2e34015820da003787334b83adec7b3547ab54020c6038f1ad72e7b53"}}, @TIPC_NLA_NODE_ID={0x77, 0x3, "db5110f5bd3684c116b74401af0aeac501ada78e37b50671ed1d9cac9577dd6af337258bd3b1ba17993878ece9bdce130591f81731ec0e93e1fbd567fb55147e9b60ace7ad8fd105c83a0098047ddf7aa04d6afa2725f1e268a377074a3c2a4de0029861df3b45c01c16c9b242258c81980978"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x34, 0x3, "ea75ef8a27973daed737c8c90ae85fffb4b9ce9773af57cb084f0a9f37ed33c26ce5b27ea99791f4e3e04581b00dec0b"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0x80, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x37e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0x30c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x192) pwrite64(r0, &(0x7f0000000600)="1535c5ef52ac282fa4df56594e61a23563d740ec929625f0d18af58a5936584d6655cfb753e9185b4f561c057f90b80df1711a4ae27868fd465ef06e5bb1cb65be09bdab23cb2a796d340ff7a7f4e904e8ece7fd35911958d8b1fb38ab0baca16245bee9de5ce6c413834044ba0278409fcfb76ada10d81f865e2aa9e971abd1acb7004728ecfcc32d46a7d228f905ac3b465494fdcb84980c2e5063a5a9c1c35aac17c634faca6a146cd32b271fd694f36fc8cf822f1cecf4484afdc5f7c8402ad5fb1fb6f82825c882fde6a7d9d1597c50047ba9a96de311400c6b12f4c7cb3cd97068c888982cfdd8cc685a59ed38711adb8395098143e6255f1abec9f5b80d5ac3e5a41cbddafceac5f138258077f48c3c0f2c7df909323d4036949322bf4c2c8a83111f17befa493568f6df7a155360cbd9ea6d1a03d03ee0449cbd3e9044ba3a253242781cb715f5641eb37cd3b5c9a9f499578d975f20b3b88f38e8cde52e6e980b229caaebfeaed9286a76ce254a3282d19bdcd6e248439821a224074237d571b42b521f6270e1bd47348c43e82f8786e7e0e3d05b984e51a0c1af23526eec1bf4690cb88c88fa2e5d0295178acf3f1502a21ce6923af7898c8cb69eb7bb6a23b1a2daa8c0fb1207e03cc9443fb1ad176f041eecef2325766d38a6c4a4fc7aecbf2b338d93716d41f71d14951a4fb9f07cf27c3efc98e5141073f9bc6cb77e862ca6acb99725b3d221e83c85b17d06d148c7369849abdc9851a48434cedabd08121c561489ca9e7be6c6978343cb374508398bf77331b780c14e55bf8adca0c0dc91f3937a3d6dd8348c9098bb25e177686cf2f7e7812829012c0491097ab8fba0c2863176b679021a326e4ca5251b002f30136e34e189080f80b8dd23f502856ce9f62b2cff4ec229d9af16795c81b8e91c28987d53df3c6e129a4b4da5daab51125a50046a90f5468ac598103a6c22ac0dc1e56988c0a5390aa3f75d48b81d71e8662f6ad27eb18b04cd556d6e2544348ac16106eaa5fc788c0d75fb3ff8d5046bc74c3296f54e7073e4e20bf99177b744c440bbe4d513ebb9e16e423115eeeb475c90aad0c40c33e607ec2c358601b64892a102e12278c9ea29665bad9cbcca70edfe1a4692847122fd0084d25666b2800068549536b16fae92d35db433ffcea16689cf3f9912daae87c6d9665f35c95dd5d9b9d9572ba229449ef27f0b86942647efe1ac73614e82a4f81e4589e5789acbb96fb7ec0d953df1ba7930a82c1f46ef0db86a497fe78a960b3defceecf386ecc76a0d43ea806869f4d0b381b3fb6138e0ae72b8fdf0eae64f14f69a7402dea9b970b823202d2e57abc77ed3774449b7ade41761e810b0d8c9428fca89b94dbf4878ad6b9f54b00c0f8c43dfd96f86a924d2e7a8ec3004d0f5a483c5e0b5e73b23e580e8960f20963751f71485e0c4fc51c8b612321580d06b3e81471790072deecaa1595098e985bfa7965937a390f1539d15e803b4922f681708c40bc0e95cdc2240bdffbc17e7a2fdffbf1692e50d93d9c2d72ece8443ad2216a4b0f24adf6322b453a985d46bf47e58ed8cdb76176cff6dab7814deaff61bf851534ecbbe919abe44c405d2b672d3db4e9c02cfae54840e32d2d42cc13585b076b066ab3d623e70ea0bce3c4920e8deb0aa7ee61a6604d7e677771100251ab22bea20ee592061d79bb92af47cefcacdf23b368910206fe9ba3d529b7bfdd0e27f02a858b7ec8f6d1f7169c98efcbe45153773b079ec48c670947804c6856b0efcc9f6981f2678b12416fecb501e9b7f2f16f20f38408d76762e20d5b9a671bd19c192a2aa65d9885c4c3cb9782db3f69fb800f63697c04853e555653ff32dcddb8dc165f1f73d42116190c2082aa710ddc97788368f72188e2e72a0faf29b8e77765a5726c977aed6c2e7b0f385df38048ff74edb8933e6c187908dc0972a0459a3d56e181a4e22e675633e440aa3b8b41cc43bc9d8d82c42b6e703d23b452942001c023703eababfa28067001ee9b9b04452cd340da1d882c5ba560323864813790853c0d3405b0388a1bcaff2a52538bf1068dd3accd438ea3cceed9a3554b36bd501437fd75bf7507b4456f42e790f9e4897657056d9ed07fbffd4ccec8c3108be5f77e3f98cb1f0fce2f99739edc2f82b2e79cd9930af1501e51b651535f331f49cc9a8f9b097a35d7880802445345e0a4a508e7c3a716dfc1582bbbd7e805906bf3faf452ce7a8956274cc370da64b146a8ac4dfe62e426661b8adae6df193b1b3ac1b105bae9e4f09d74beab013583b56a8ee8089e1ec43b71b310726509496253da52b8d365970154c682d833bfd34c6c1b52f37259a0792a65c1268c375052117ec19962cfecdcea5d03b043fd5e62a9511c6c1e98e27c41422348d6aa28f313156c2f5820899254a817b74d4eff020c0bf40ebd4176751b2cbebf779868acef978f911993dbcf241c07683f0b53a8456c88d0a2ecc7d3c79dca5a429764a86f9a4e040e4bb43441fbdaa9c37b0efd8c67cbbe0042802fd07134a64d7e3e6844fdaa535eada097ed5e53207702abb05bd3892b3eeea3fd8765163a347dcb6c236e0fb9cabda368b114000d3b5f30980ab8775b5c060ac5ce7e0da33d79ce43391027503fc2d0db67f532cdd84e4a3e9f339928689cf7308b049080471a6fbe5bb8177dcd61da5bce5cf28a7df508acdbdfded7e728cbfb0097a360911fd6225befff74098b65d10bc4e6cf0323bfe3cb08a04a7c49f9fc7c1415eb37b9a2c0cf30dc09c84d03e1a4af45a391d61f16abb653c837c12965abc7485d517aa5d083a0fe126603756ab5b5683a0133dc254a7d1a53bc780408f2e87e9b8830db7728840834dacae347d5a629555e87c447e949b7d63069f114768a605be154004afac07d8bf68a5e4b1efad398323e84bc4bf1bafdd1f26a8f6180a39e572462cfe8495948a04692e96cda4ca724290731c338db9e9a3a7d90b57fdcd32dc73538164a51326a6bd42a6f421ce9d2c02cb5d012a332418fe12281b9488200e79806c92edea2929e647f489d58e3c637cf14c7438bbe849d3322877a34ea801e50fc97c022ad52708ee347c4087dc542567ede99de52683fe1715bd6abc5d83e3eeab57c0e5b34514a87612acf1720bb6f0d4fb7497a189c7885a4b511aaacdb4872e10e6f273dced28e3c3eaf8c1d24b701ebd694607c168c9fc086ebf4716195ed940c067d139954fe65f698c298e69374d834f026cdbd472489f8ff0fff878ad75d55691ff6c9fc45cc8e31bd9ad0660c56fedf2acd7d0f6977ddaa4b20aaeb6443cb82d481bdc19eab68f8d299aadcb82c7129fc25781a6a8727248f4e88c166dc113cd9ea4e7ecf9c8029a04e3cb4c1afe2085174fa8ba4ab93e85a68013871b37a65f1dfe227ce80e4e9cf94aca7e3ea525a0d91369bfbd45ec78d5191a3f282c70d567c2805e44697876049c0b66ba51f2b8ea35d464d61457745e793859f9f05fa1e15390b59668ea47404126cde2e4ea466e82b91c58c01bb06319079cac5573506dbf2e846e2a74f9f9fb5881442cfd6565009c9e315df9f309bf35712f1db5aadfbe1f78864b745ef18314550e6445682c71d85d1127be1c07c4ba762b5a44eb863c1aeebc3cfac80d61e9e268da12d90e1102fa81d04eb932830b0e9bd4511353e42d7b52ed017ab8efcc025e16e1f3f5c95c6b4772a0471136521f54c34a604c708bfe000b07c831702c0baa083e77d43db62e54a0cdc0b045e77bf821d6dfeebd335aaaf7f2c2a98ecbd74637e7847f43a71995f247340e4076c903d339afa54342ff8c620f5ebb668d3672b5e559790f9c8bb64236aa5278f08cca5f64195ea8787a58f7e3f5a06145955a232384bae066b9d12bf10a56b9c2925fcfcf147055caada52d4e5813df0a5311e4115c9a40f257fc11791cfadf0a22fe4656d38c6deed01b71e5d6472f27235bcc02db2dded53436f107d2e2d471bfadcf49f9ae40194f70bd183028beb48e729ff1e5744ec4753a0e57a596c1e817f24fcd85b6fb39e5bd6cc8108c7ef429cc051b58d5bcae2a84c0ac4990d24ea6431e7eb22d8a1942cbb1fecad67b6e9fa3a3c5b63c20e3d49e8ffb07c0a91da2e0019a3ee3730212f738bba76eb6a6acebe51483b6beb3cbd7849ca5cc57441013ff6430a05b5d92cf247f71cfbb0cf9901672fc0726e9eb71ffaa0347487dfbf8868384fe60fb9554b8dc3b8d1ec50b8aeae47c680762c233977c8975b4e860cc01834083dc5c4ec720c7eb55203700388470a927d91488f292a624712d1f337f81ba791e1a9f36c074887db90546c573f1fe400860d2c4e573e5444f7f882013bb6ee42fbe946c9d2039481408a253a49816b87c675d72108b6e7c4a305b60e4e5f05fa5a3d2339fae0851a1ee432c43f0b43386529a6a43b660d2cfc2f0234782b0fa17f5343575f81f9dcca5275d0a8987aa2306e72a6a89ce068e90f199f9e78f4cf2560ea01199580969a98c867df2daa84fe66d84e245f1ee2a79c441803cf96867e33a06b8d8ff5494985aa227f4f359f9fcc7a404706c91a821db60bcda76bf6d9224eaf679c8dc747454270437fd57c2b48f4f3621798d80759abd2c61c9d2399c610cba26592617418b2f97b48602842af6f2410f54d62ccce93ad4723415ed6ad9a1ea02f0628aff6491e865db3388bba65579f71fdaf6aa921025d70a5ce881da2bbbc86886a59515e343363f28c5967865988f2b9001d79b012374ac860d461503a05ee3815b54836d45f6418aa097fbce4419cb0331ab10427399c441a17423b5dc288ca702f6e54cf04a5dded9ed296a277dcb01723e65d52c538336eb3d5658e783baf6c5431f6439ebcd049ab7cc48ae683feecb51c07fd54a7890a489cb2bf0ab557e6c1fa391479c95cf24160dbec665219026e23e9ec1a5a721e4133f9256033a420c16c17e038290b2df5067c37af1818886921635299e75e1cbc4c68687f1c8e743262185a341e48091ed67389156cb257e5c529f2efce4265ee1bdc616c180239238c57950476e3c3bd6554ba1950638ab07fa5d176bead9948350fa0e5632acf9bbb51dfb0a5473644b440ec33851de3a8ef6e2e4c777c20522e440855f7a80b039d8d486931ed46022ce0895478355af7b8703ef006f60a53fcebb43cc9684097771833371d9cca273390828c16ddc278a16f8075e2f8d9c6d59c68b60c5e00a14920a6d420cff9d48b066e356ff042721a4034a294b72a76dea6bf6b7bae0dd0f7e04708a7efee33ef40fe2507e24405d42ea13f797acc4594b83b7e603ee364e404828494fcb27cc3daa1c240ac9d2fdb0ba6693ce8309eef0785cd2fbea32121893270346c5c73849a9cc79dff3610868a2c19da94c63cbf3201191ab60bed8ff79932256de232586c236835228456d998254c706dbce60c14bc569717aacff2ffe9415c2ac8e24d3861c88e3b2229379e27fc5dd8d10c558fe341c5e6920c5bd8e966ac9fbedfb14264fda35a64c9a73ac46bba80b3e3ac3b80a85aa0e55140c7069ca33f81c4c9547b262a78d2f9c87965b3ecec24e7d9ef5d1904813723d6d592f4687f42315d3f256b6f0c7b8a516b57f19c91a45b34c51c5c7d75b59aa8ee9f98cb3eb09a23c2f84c2baeb8bed51f19d34cb1f7306f3d0386ff8801a25a9333571d57099eec3720082e7752c9b246c9cab7f3b097e24252dd61bcf0cf162e9a63397693bd5379fe19bc1c63cf392eedda094ea4e93643a5521f7", 0x1000, 0x80000000) 16:14:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe) 16:14:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xa00000000000000) 16:14:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:14:25 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000300}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:25 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa00, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:26 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe0000300}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:26 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1100, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:26 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe000bb00}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x100000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) [ 2386.831964] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2386.833159] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/302/file0 supports timestamps until 2038 (0x7fffffff) 16:14:26 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x11) 16:14:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe00000000000000) 16:14:26 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1=0xe000bb00}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:26 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x34000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:26 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780), &(0x7f00000017c0)=@v1={0x1000000, [{0x3ff, 0x7}]}, 0xc, 0x24e058c60f89a1b1) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x7, &(0x7f0000001840)=[{&(0x7f0000001d00)="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", 0x1b4, 0x3f}, {&(0x7f00000002c0)="072e0cd400d03a985cefc15330d46883d51dae800f3931240a25555c5ce3cebec6bafe76d458d8d02e41e6dabacdb0a9396e970f7b006000b5c4ecf80ee058b34d636df8ae39f844357894688cfa90c644a3e04bcdbf8b6a54464e063a9eff32ec4ff4632b80973134c1c7", 0x6b, 0x1}, {&(0x7f0000000340)="90c07e8c8c8f485ff6b5bceaa2f6892b2ea5338777833c743dc058f1a82c63ffccc5674357719ce35117471d6109a5c01f10e1a3a8765fe993cdc3313a4fea31a1e0addab8be5d788a4df719592287b1e50b05c48d1b97a17325ab79c2f0d0d00baace538734ed", 0x67, 0x1}, {&(0x7f00000003c0)="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", 0x1000, 0x2}, {&(0x7f00000013c0)="562334babfc9216eae91d7fa35fa272bd7488d4087b4d7e5a6d1e37fb537c47dd20d3bdcef99f7b0e92368be69d9da9d9e7047ccc6d4c6838446fe99f123883f5e06e440be2cbe2411904d8fa19467342e43e196426c4f69024656d6894eaa573641bbbcd4b50a9458315b69411cd4da5827376d2515dd05152e8c19e92525ddf98281f3bdc48eae4eeba8f97fe5e065d3da223c93ba886a4bccca1ddfd8ce1cd0e51e3ff337c7f1e504f0c45b7c4a293610c619893fe525e4790294e07c47b6a2602b", 0xc3, 0x401}, {&(0x7f00000014c0)="0e57a00464b70787bbb53fca39779a92514643051cc02630de05459f78b37f4c59f58fcb4c6561257e45de9077e4f7f48c824cbc2b0077fb125fd302b5907e7a687baf36dcc708f77693d7fdf520ab8431cc69bd6ecfbc748cef9a8c286f872059568abdf703d5861011fb6e855129ae7e9b1b25a4011fa39f5d47f3da68139ea1e1276d792a81c5fb9b02705d7c776fccb951d58bf8d4b2259343543621e3cd280de0b2e911cdd9f34fb596179ae22f033a419fe43b77e3c7cb56ac07b613adc1bdbaa30cbee711cd8b89eaba656fb7", 0xd0, 0xff}, {&(0x7f00000015c0)="fb9624a1144616ca21c6fc87f9866102bbbf1e697e0ebcfc878be23a7792648293ee6d4a208e53d700040d42b20a23461cd379e932f18070b34d081633ad2a9cf7e4a7a9ed6cb03622246ca8be2787660c80502af867ccefd81a946d3987eeb5e89be898b5b0a9ab208174393e9c81f0ebefef196f42570861a06ed73ee5e447d536e275390a607e239f1f15c60e1cf309457547fd505da540943e3ac9dd8d7eb1717e32db755e693d653d935392f79dd4576f1fb1b1a1de2896fe521ffc64448fd2c7", 0xc3, 0xd0fe}], 0xa00000, &(0x7f0000001a40)=ANY=[@ANYBLOB='mpol=prefer=static:,mode=00000000000000000000005,fsmagic=0x0000000000000006,euid>', @ANYRESDEC=r1, @ANYRESDEC=r1, @ANYRESDEC=r2, @ANYBLOB="df0300000000fe29c8df49564bf794f31500bec29340"]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioprio_set$uid(0x0, r1, 0x4000) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f00000016c0), 0x2000) 16:14:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7c88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:14:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x200000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:14:26 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0xf, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2387.136318] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2387.139379] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/303/file0 supports timestamps until 2038 (0x7fffffff) 16:14:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x18) 16:14:44 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200000d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:44 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x20) open$dir(0x0, 0x0, 0x0) 16:14:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7d88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:14:44 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0xf, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1100000000000000) 16:14:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x300000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:14:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x400300, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:44 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200000d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x400000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:14:44 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200001d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:14:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1800000000000000) 16:14:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x1000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2405.436950] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2405.438120] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/304/file0 supports timestamps until 2038 (0x7fffffff) 16:14:44 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x60) 16:15:04 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x200001d0, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1f4) 16:15:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x6000000000000000) 16:15:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x500000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:15:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="01000900c0", 0x5, 0x560}, {&(0x7f0000000040)="479955df7dc5b11817c27d4fff90c4c2b59db8af99294994f2c0cfd4b03bec25ca90143e7d755b3aeeb1644e90fdbf6339fb59490ea05508cc7a1d918065ac2be28a75c51d6266d300f81ab83fb8cf1c57a55941c01b9d25461e2672c78f84bd27463d44142e5aaa7b82e2da4508b736588e0100000000", 0x77, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf414aa875c28ee8532655f000000000000040020", 0x1d, 0x147e}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000000)=ANY=[@ANYRES32]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:15:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7e88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:15:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x2000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2425.009337] EXT4-fs (loop5): Unrecognized mount option "ÿÿÿÿ" or missing value [ 2425.036801] EXT4-fs (loop5): Unrecognized mount option "ÿÿÿÿ" or missing value 16:15:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x300) 16:15:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7f88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:15:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x600000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:15:04 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe803000000000000) 16:15:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x3000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa085e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x3e8) 16:15:04 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x13}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b21fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x8000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8088000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:15:23 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xa00) 16:15:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xf401000000000000) 16:15:23 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xa000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x700000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:15:23 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x20000018}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:23 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa085e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:23 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000059000000500100000f00085164a0ad00001d1d800fbe3b2f18e7860000000000000004000000000002000020000020090000def4655fdef4655f0100ffff53d4010001000010ddf4655f00000017cd602d701fd73d5fb2a4ab9cbb0000002c0001000000000000000b000000", 0x74, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x1060, &(0x7f00000001c0)=ANY=[@ANYBLOB="561fc376a80174ccfc4e5f6e", @ANYRESDEC, @ANYRES64, @ANYRESDEC]) tkill(0x0, 0x36) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000017c0)='.\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000001d00)="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", 0x1000}, {&(0x7f0000000040)="98e93e79624456534fb32861a5964685b48433b69967219ef3c15809", 0x1c}, {&(0x7f0000000180)="11e9c0d41c0b44bc97ec15b017a250f9a2d47d0e28d0195d478838280242ca595f9dc0c18ffa38b29bc3f57f2b9eec6682", 0x31}, {&(0x7f0000000300)="2e087d607165e7c547eb14187ccf655dd67a03c99003ccaa3126b1ac00579068f9", 0x21}], 0x4, &(0x7f0000001880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1, r3}}}], 0x158, 0x24008010}, 0x8000) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = fork() tkill(r6, 0x36) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000017c0)='.\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000001d00)="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", 0x1000}, {&(0x7f0000000040)="98e93e79624456534fb32861a5964685b48433b69967219ef3c15809", 0x1c}, {&(0x7f0000000180)="11e9c0d41c0b44bc97ec15b017a250f9a2d47d0e28d0195d478838280242ca595f9dc0c18ffa38b29bc3f57f2b9eec6682", 0x31}, {&(0x7f0000000300)="2e087d607165e7c547eb14187ccf655dd67a03c99003ccaa3126b1ac00579068f9", 0x21}], 0x4, &(0x7f0000001880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5, r5, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r5, r5, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r5, r5, 0xffffffffffffffff, r5, r5, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r6}}}, @rights={{0x20, 0x1, 0x1, [r5, r5, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r5, r5, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, r8}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r7, r9}}}], 0x158, 0x24008010}, 0x8000) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x3}, [{0x2, 0x7}, {0x2, 0x1}, {0x2, 0x2, 0xee01}], {0x4, 0x4}, [{0x8, 0x6, 0xffffffffffffffff}, {0x8, 0x3, 0xffffffffffffffff}, {0x8, 0x3, r3}, {0x8, 0x1, 0xee00}, {0x8, 0x1, 0xee00}, {0x8, 0x0, r4}, {0x8, 0x0, r9}], {0x10, 0x3}, {0x20, 0x4}}, 0x74, 0x1) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x800, 0x0, &(0x7f0000000380)) [ 2462.237391] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 16:15:52 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x13}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe00) 16:15:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x800000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:15:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x11000000, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x7ffff000}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8188000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:15:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xfeffffff00000000) 16:15:52 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c00010000000000e40500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x61}, {0x0, 0x0, 0x1200000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="3243df33cb9886ec", 0xfffffe97, 0xfffd}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:15:52 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0xfffffdef}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x20000018}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x900000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:15:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xfeffffff, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8288000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:15:52 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000040)=0xe4, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:15:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1100) [ 2473.200275] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2473.304538] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:16:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0xfffffffe, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20028080}, 0x4000004) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x200}, {&(0x7f00000002c0)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000000040)="504d4d00059de82d12f7733247a17e504d4dff213d2b95e0c86968e53cd9cedbd6ab4c8d687ded", 0x27, 0x2}], 0x0, &(0x7f0000000180)=ANY=[@ANYRES64, @ANYRES64=r0, @ANYBLOB="058792516b259ed0a7f2437e1f4c5e1b0abf73b684cc0a18fcd53e7bd227bc5c2935b82666b60c031be9c8d65647fe09b4421c"]) getdents(r1, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:16:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1800) 16:16:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x7ffff000}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x3, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8388000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:16:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) sendmsg(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) r2 = accept(r0, &(0x7f0000000280)=@qipcrtr, &(0x7f0000000300)=0x80) setsockopt$sock_int(r2, 0x1, 0xc8fb20b5ce1ca88f, &(0x7f0000000180)=0x7f, 0x4) r3 = socket$inet(0x2, 0x3, 0xff) r4 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r4, &(0x7f0000000340)="fbe08e1dc06ab6a70cfe03077009bf9894ba94f3f64856228833bf870703cfbf08834939cbe02afc3b2c687f1eee41929aa291c186770cf1fcf876018f4a3e385833e3c40710c5cddc3df87c22b9d2cccd3eb62e", 0x54, 0x4001, &(0x7f00000003c0)={0x11, 0x18, 0x0, 0x1, 0x8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xe}}, 0x14) sendmsg$inet(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2492.209439] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:16:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x4, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2492.232157] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 16:16:11 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={""/10, ""/2, @multicast2}}}, &(0x7f0000000180)=0xe8) setresuid(r0, 0xee01, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r2 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) sendmsg(r4, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = socket$packet(0x11, 0x3, 0x300) sendmsg(r5, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) setsockopt$packet_int(r5, 0x107, 0x9, &(0x7f0000000380)=0x6, 0x4) 16:16:11 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x108) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x22, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="ac3d051ff68a75a3838014f6f9aed5685a8b4c71685a0211bfd5681cc25c95bd4df69f0f2990d2eb8c294b6f4cb1f88b3a447d4ca3625691dd15e236bbc86cbafea459e9efae502df9aa5709b60f86cb39c3ca65cc951e6ac09c61d235aed94afd31373751fb1882de13bee39e89edb69dc92de251183ed4173002d5c5df742c0f98a85d8120454adce30841b15736ee29dc9dd4069ea45081c9101a82dfdd0106728b8ec0ac62e212522fa475", 0xad, 0x6}], 0x1000000, &(0x7f00000002c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x35, 0x74, 0x31]}}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_role={'subj_role', 0x3d, '-+^&%&'}}, {@permit_directio}, {@obj_role={'obj_role', 0x3d, '\x82'}}]}) 16:16:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0xfffffdef}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x6000) 16:16:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x5, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8488000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:16:11 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x8, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0x2}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r4], 0x38}}], 0x1, 0x8080) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000880)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x17}, @in=@private=0xa010102, 0x4e24, 0x0, 0x4e20, 0x8, 0x2, 0x0, 0x20, 0x3c, r4, 0xee00}, {0x6, 0x1, 0x7fff, 0x8, 0x8, 0x3a3bdf3f, 0x1, 0x2}, {0x80000001, 0x401, 0xb5, 0x7}, 0xe93, 0x6e6bb1, 0x2, 0x0, 0x0, 0x3}, {{@in6=@local, 0x4d4, 0x2b}, 0xa, @in6=@ipv4={'\x00', '\xff\xff', @multicast2}, 0x3502, 0x4, 0x1, 0x5, 0x7fff, 0x1, 0x85}}, 0xe8) sendmsg$inet(r0, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000100)="131ca543a76636c60945e1fcc012dad060cff64543756a97ae08a3724641ca6ed8f7bfbdb6771dc351bbf828f85f30cdf4f984db1b613c71a516b1239944ece86fa694433b0719b42ac179e9d106", 0x26}, {&(0x7f0000000180)="0296672ff908f7bbe00750276297c08316da0d3994f95858c95d", 0x1a}, {&(0x7f0000000280)="15b8cbf26a0d9991f6c1ce32a09d73fa53acc885497bbb", 0x17}, {&(0x7f00000002c0)="456e807dae6fa374355fcf7ff8482ce1b46673b86f37778a8677da64dcccdcce27f36336db233117f4b51c0b85bec119db16a75a5a4329e6a04f7f5f0de25279d4d506f99acfa259050b11f60c2d1a02d917f1431487b7b5ba0e9df5bc21ff82d843aaf716a5185cb831496d888d4c11d8342668cc826eb63f007e0786350f98225ee46513bbd6ea5c6c8676aae95be8c8804231dc", 0x95}, {&(0x7f0000000380)="002134356315bcc7c123517844af1129efef185fcccd071ebef4470b73dc9de8b91cc4cb8fc7728edc8f98f5bab2a4d6df272a26166ed5463c95ac418b5617e19da0ad05bebc4d66d96df57a6b81f725a1848de21557aae589874a0f22f1a2a68e316c3e3ec8c1bded33275bb3", 0x6d}, {&(0x7f0000000400)="1eb0444ddce0e7fc3ce6bb8220e91411facb746263bdf7bb56f28db15f92943e9f7ee730f18ae4200d25a1976af8d05f639c5a07571c93b685eff3271b590e5bdefde6083b36d0b466ed01ee61e9e1b88996c40fc455372c9a4ba2ff2fd48c3e", 0x60}, {&(0x7f0000000480)="e1c4a083f7e48493ca05edbeebe14a7e54b9c9a10ebfbee56dba5c25137620667c08e97e87af52711da6f100faa9cecf5dddfa4cff7f5874040cb38b00cc6468a97e06a8ad246fe5afbb7baf9d5aaffcdcae51d3b85c7ec88d5f9c91c5c4f82123d7ed7c60e0d820d7a73801b8f2846bd18c4c34df8b1e926d53652677b193e6f17b2954fb6e7ce03bbb36f0cf1d6141445a321afca181b0436f53bf979f120c889f7a3967d49f56c0a0a05a0c06b3f38055f59512bdb6d08c88855c2f149133a45c6cb4b39b5e42b513f75318547a8c21c5ebe23ce96abe7cae80b09b52cda9f4984edd61e8258c66216e05d7e12778a179", 0xf2}, {&(0x7f0000000800)="37da82118e0a410000001802b23c014b1ec54d756c05849a6ce912bfb9b24df8d54d0b09226ad2f1a0f135e1c9f02cbf0891d76d35f130e2e4249378cb2cf4d6d80f08e8b555d3d25b22ba2ca08c028f484fafe51585046fb19f00"/101, 0x65}, {&(0x7f00000005c0)="b6235bcfada16fabea48ba6eee3704b3a0fe", 0x12}, {&(0x7f0000000600)="7ae27c2466183fb1e442c663f57f745e5a63", 0x12}], 0xa, &(0x7f0000000700)=[@ip_retopts={{0xb4, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0xc6, 0x0, 0x8}, @end, @ssrr={0x89, 0x17, 0xff, [@rand_addr=0x64010100, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @remote]}, @timestamp_prespec={0x44, 0xc, 0xf6, 0x3, 0x2, [{@multicast1, 0x200}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x14, 0x3, [{0x1, 0xe, "f0151fc0f524eacd60dfbe36"}]}, @generic={0x44, 0xe, "8d23200d3b78b363de9b4f12"}, @timestamp_addr={0x44, 0x54, 0xe5, 0x1, 0x0, [{@multicast1, 0x80000001}, {@remote, 0x1}, {@dev={0xac, 0x14, 0x14, 0xd}}, {@multicast2, 0x5}, {@remote, 0x7}, {@empty, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3f}, {@rand_addr=0x64010101, 0x7}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x3}, {@local}]}]}}}], 0xb8}, 0x4000004) 16:16:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2492.488728] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2492.491596] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/309/file0 supports timestamps until 2038 (0x7fffffff) 16:16:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xe803) 16:16:31 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x11, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8588000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:16:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:31 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file1\x00', 0x60000, 0x2) ftruncate(r2, 0x81) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x2, 0x7, 0x0, 0x1000000}) fspick(r1, &(0x7f0000000040)='./file0\x00', 0x1) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file1\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x4) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:16:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x80000, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:31 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x3, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:31 executing program 3: syz_usb_connect$cdc_ncm(0x0, 0xaa, &(0x7f0000000100)={{0x12, 0x1, 0x98, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x98, 0x2, 0x1, 0x66, 0x10, 0xfc, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "0720e9cb"}, {0x5, 0x24, 0x0, 0xc6}, {0xd, 0x24, 0xf, 0x1, 0x4, 0x1, 0x7}, {0x6, 0x24, 0x1a, 0x400, 0x10}, [@mbim_extended={0x8, 0x24, 0x1c, 0x5, 0x8, 0x4}, @mbim_extended={0x8, 0x24, 0x1c, 0x81, 0x2, 0x6}, @dmm={0x7, 0x24, 0x14, 0xda04}, @mdlm={0x15}, @mbim={0xc, 0x24, 0x1b, 0x5, 0x7, 0x5, 0x0, 0x4, 0x5}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x1, 0x64, 0xff}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200, 0x8, 0x80, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x81, 0x9, 0x6}}}}}}}]}}, &(0x7f00000006c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0xe37c9e8602a31798, 0x78, 0x2, 0x0, 0x8, 0x8}, 0x9a, &(0x7f0000000280)={0x5, 0xf, 0x9a, 0x5, [@generic={0x6b, 0x10, 0x2, "09319392cd98bce3aedb7981d6148d80bcc83190c98d0294daa2d6e78a6f2ba1af2f1844726003d58eac6ecd68e20001f4015b607161fed4bb3dd693c090783142a8ad030ca6ab4d70735498fe8fc7cae146a13d7c794fae94377fe539973029d82b2bb0157c2372"}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x5, 0x2, 0x0, 0x7ff}, @wireless={0xb, 0x10, 0x1, 0xc, 0xb7, 0x0, 0x0, 0x6, 0x2}, @wireless={0xb, 0x10, 0x1, 0xc, 0x81, 0x0, 0x7f, 0x1000, 0x6}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x6, 0x3f, 0xffff}]}, 0x7, [{0x61, &(0x7f0000000340)=@string={0x61, 0x3, "1844799c1cd6cfcde356345a47384f6134cd5c1ceafbd25e93c47de1c6068739b2006baabd62b644ab878671357ac5eb7425944508c59336d6fcabde6085fc6b153072095dc195ce76887ca835d105a3bef254ec5a81fb76ee9557592520a1"}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x809}}, {0xcf, &(0x7f0000000400)=@string={0xcf, 0x3, "473a680798f50ecac06db7660081c00d91721e05e7304dde9863400a628b79a9ab1a88f14361ef7485b4810426d86a0363d141a2ef909d7d2fc4c80d65847b50c58f2b255546232f8cf3fd33203a2f77fd28245c077471fdcbd86758a168924b7e8f067ab5491c3dadfa960b4b73f8f53cc722284e297badb8c7c71cc54959b1c16f71ec74b3cc4a59725f1325dd9e8dc5772f54c9236d1b49a9edad01f8fc42e777595e215c38e82fc0bb02308162227c6bd0c48e900e0e2f55a28c96584921cb90aee33ec2d66161c2acad84"}}, {0x96, &(0x7f0000000500)=@string={0x96, 0x3, "8ed10478e94980a47f1bcec5ca69ca439a4433d8e597068796de7d5dff06510aabc9aca779a67dc317fb312a8e3307b75dfbae4dca3fe7d0ec42967dc4ad46a9393cc2d5cba28a50e6e8a8a82ec41a371e6b765b85e5dd272a0aeca82db626256a37867ae0d4ae1de4aadc52031b19dff5b4e6131b1dbbb10ca072ecac2a199fe923c9afa0a3b7ad6f97f619b08bd7825d19f711"}}, {0x6, &(0x7f00000005c0)=@string={0x6, 0x3, "8afa08c6"}}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x81d}}, {0x62, &(0x7f0000000640)=@string={0x62, 0x3, "4cdd092307be336579d9384946883020b2a7791eb8a134ff3a5e582e2d37468ba127ad7f18947ba51cb594ae41168a7c41e7eeeb1a8fe84301690433bc7b94068d9af1a30ea30135f9b2ff33e65017f1efd558c30afde8d9db131a43a240cfbc"}}]}) r0 = socket$packet(0x11, 0x2, 0x300) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x84000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0x2}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r4], 0x38}}], 0x1, 0x8080) bind$packet(r1, &(0x7f0000000f40)={0x11, 0x3, r4, 0x1, 0x2, 0x6, @remote}, 0x14) syz_usb_connect(0x4, 0x3ff, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000e80)={0xa, &(0x7f0000000b80)={0xa, 0x6, 0x201, 0x58, 0x3d, 0x5, 0x20, 0x3}, 0x1b, &(0x7f0000000bc0)={0x5, 0xf, 0x1b, 0x2, [@wireless={0xb, 0x10, 0x1, 0x2, 0x24, 0x2, 0x80, 0x3, 0x6}, @wireless={0xb, 0x10, 0x1, 0x4, 0x20, 0x1f, 0xf8, 0x6}]}, 0x6, [{0x4, &(0x7f0000000c00)=@lang_id={0x4, 0x3, 0x2801}}, {0x74, &(0x7f0000000c40)=@string={0x74, 0x3, "69a8ffe9f9abfc485e5503040df0ed99554eefd42e195d5107e6cf57e9b5ad787b35472c5bcfb8f2560a290dc8db570ec79c69ca582974c1ebc0b6c76a469e91a0224e38b264eb2472fed2d8b9e2b5c4ffe6cd1053509cc9c1d236fb439d362c5bd379ddc5e26a8149d9b92251f5936c30b1"}}, {0x4, &(0x7f0000000cc0)=@lang_id={0x4, 0x3, 0x44f}}, {0x4, &(0x7f0000000d00)=@lang_id={0x4, 0x3, 0x1409}}, {0xff, &(0x7f0000000d40)=@string={0xff, 0x3, "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"}}, {0x4, &(0x7f0000000e40)=@lang_id={0x4, 0x3, 0x438}}]}) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r5 = socket$inet(0x2, 0x3, 0xff) r6 = fork() move_pages(r6, 0x0, 0x0, &(0x7f0000000880), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000f80)={'macvtap0\x00'}) fcntl$lock(r0, 0x25, &(0x7f0000000740)={0x1, 0x4, 0xad8, 0x6, r6}) sendmsg$inet(r5, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) move_pages(r6, 0x7, &(0x7f0000001200)=[&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff7000/0x8000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f0000001240)=[0x90, 0x5], &(0x7f0000001280)=[0x0, 0x0, 0x0], 0x0) syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000fc0)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0xff, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x2, 0x30, 0x6, [{{0x9, 0x4, 0x0, 0x46, 0x2, 0x7, 0x1, 0x2, 0x3f, "", {{{0x9, 0x5, 0x1, 0x2, 0x10, 0xfb, 0x1b, 0x30}}}}}]}}]}}, &(0x7f00000011c0)={0xa, &(0x7f0000001000)={0xa, 0x6, 0x200, 0x2, 0x7f, 0x1, 0x10, 0x6}, 0x2e, &(0x7f0000001040)={0x5, 0xf, 0x2e, 0x4, [@wireless={0xb, 0x10, 0x1, 0xc, 0x19, 0x8e, 0x4, 0x3, 0xff}, @ssp_cap={0x18, 0x10, 0xa, 0x40, 0x3, 0xff, 0x780f, 0x5, [0xc030, 0x3f00, 0x3fc0]}, @ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x2, [{0xc2, &(0x7f0000001080)=@string={0xc2, 0x3, "8f3fece697dadfeccc3aba213b41007099b201b29e8826085add57755be152b44fb2b1844774b86b260b4e9190651432adaaa5b539e58c52e20cb5e84156809279c179c2ca2a967a064c89e8fcb7af6b6bd8fa6ffa001a0366972412a4f5a40dc872aa21ec00bc3a9f93bd34dbe189bdd275a6c510916a067f4a43aae2d4538017f7e4354a59340458d7ce3f19e10d349cf87209dee98c685d71e3ed1491fe7889c29ad5d05e7af8bccd3d6eb9557b22424d84df8ac51c4ed85481c92ef0bf81"}}, {0x4, &(0x7f0000001180)=@lang_id={0x4, 0x3, 0x180c}}]}) 16:16:31 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x8, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:31 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2512.531832] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:16:31 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x11, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2512.544164] ext4 filesystem being mounted at /syzkaller-testdir306898857/syzkaller.udohUo/310/file0 supports timestamps until 2038 (0x7fffffff) 16:16:31 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0xf401) 16:16:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000002}}}], 0x20}, 0x0) 16:16:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8688000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:16:31 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f00000002c0)="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", 0x10c, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x2000000, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:16:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:31 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:31 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x300, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000003}}}], 0x20}, 0x0) 16:16:32 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x34000) [ 2512.789310] EXT4-fs (loop5): Unrecognized mount option "C8¯*µù2R=ëΕַžI^ [ 2512.789310] #íþ½Ô [ 2512.789310] °›AaY= [ 2512.789310]  Ü¹˜YES|jŽ§$-n¢{" or missing value [ 2512.791133] EXT4-fs (loop5): failed to parse options in superblock: C8¯*µù2R=ëΕַžI^ [ 2512.791133] #íþ½Ô [ 2512.791133] °›AaY= [ 2512.791133]  Ü¹˜YES|jŽ§$-n¢{ 16:16:32 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x300, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8788000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() [ 2512.825357] EXT4-fs warning (device loop5): ext4_multi_mount_protect:291: Invalid MMP block in superblock [ 2512.841950] EXT4-fs (loop5): Unrecognized mount option "C8¯*µù2R=ëΕַžI^ [ 2512.841950] #íþ½Ô [ 2512.841950] °›AaY= [ 2512.841950]  Ü¹˜YES|jŽ§$-n¢{" or missing value [ 2512.843893] EXT4-fs (loop5): failed to parse options in superblock: C8¯*µù2R=ëΕַžI^ [ 2512.843893] #íþ½Ô [ 2512.843893] °›AaY= [ 2512.843893]  Ü¹˜YES|jŽ§$-n¢{ [ 2512.846613] EXT4-fs warning (device loop5): ext4_multi_mount_protect:291: Invalid MMP block in superblock 16:16:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000040)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000100)=0x28) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000008}}}], 0x20}, 0x0) 16:16:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:50 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb00, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:50 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000010ddf4655f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="05006c000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x6}, {&(0x7f0000000040)="ed41000000040000ddf4655b4df4655fdef4655f000000000000040020b55ab2d8bbf6119e902260aa4fb91bc4332a96047c2a150783933322023bfd8ac51e552b7fe409b12e292256626c3780db88f3ef31f837427b63f26fb93738246ff1d6d12b1a2584ce3ef921bcdf7c42a6b23e0fb76b3bc55939f9903f94a631484779253c61c5c7af4eb7d998d345bba7d75bee", 0x91, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0xffff}], 0x826c08, &(0x7f0000012b00)=ANY=[]) getdents(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000140)="7f", 0x1}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfec4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x2, 0x3}) getdents64(r2, &(0x7f00000002c0)=""/247, 0xf7) open$dir(0x0, 0x0, 0x10) 16:16:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x400300) 16:16:50 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0xbb00, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8888000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:16:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000011}}}], 0x20}, 0x0) 16:16:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8988000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:16:50 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x80000, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:50 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x80000, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:16:50 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x1000000) 16:16:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9443156100000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:16:50 executing program 5: getdents(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x6480c2, 0x19c) 16:17:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmsg(r2, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13068cf4ada46207000062ea0b5e364eee2b1dc94c1742ea96765c683f90df0000000100"}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="48030000001389000000", 0xa}, {&(0x7f0000000140)="eb383a340263550e501b", 0xa}], 0x2}, 0x0) accept(r2, &(0x7f0000000100)=@phonet, &(0x7f0000000040)=0x80) r3 = dup2(r0, r1) sendmsg$inet6(r3, &(0x7f0000000540)={&(0x7f0000000180)={0xa, 0x4e22, 0x6, @private1, 0xe4}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000280)="c439ca786ef0c480f062df9f9a556e3b33ca2ea363731a50973aaaf1f28bab2ecde739e7139f3f70986559507ecd33b625a0c0263cef43bbcb911341855fe5e1ed9835ba740f73f0e6e8009808c1c063a54c3d2afd6d714d999825a15233b805ebdffadea647d98c9afe82e3e88af0edd7e05db8a9abd75555af09b50988535b3c9afe205f90e7164badd337f1f5511fd51b5f8b8b58f3fedd4691c2ac2a7c0c7a151ad5", 0xa4}, {&(0x7f0000000340)="03a5edfa76358993acfcac735ac8377177444e400fb90b593d0c2389750feb3ab76d000dadc9238d6645e9ebba3abe8318f42ba7176c45c999c647990efccded7a621559a48481a1ccbfddf5664b7699b7bcd9d72cab56b21eb5a2e034a65cea2aae1c72a743fb4aa63c2a604b53d58eedf83394cb77f19202c6a498f25d73c66b0c730610c122b3ba01fa39a2bebbff0937668ad133cf743e38b2c30943f16edda0b11fef2a5d7e80363c9a509546d4752712d3b753de7e1a9ac7f50d73ed5d09d7cc7d8a0f4dee0450914ce14991401c7c2d05fbe9033acab17f9453fc245455f64ab5a20887654b155b0a5e2bda8939e439de38", 0xf5}, {&(0x7f0000000440)="f22e912f466fbef8cc57e21c2c02278ba85ee98e8fe9ff1cc0fca1bf3cfad47c7d60216d4f57f961219eba3ffab068e8a0d321900a3f20e86a0b860b8f693673d742827f502e22a08ec545e78da8a48938589671959a5b235b835d4cbc66c1", 0x5f}], 0x3, &(0x7f0000000500)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x0, '\x00', [@ra={0x5, 0x2, 0x4}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}], 0x38}, 0x10) 16:17:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8a88000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) fork() 16:17:10 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ff4d53ef010001000010ddf4657f0000000000002c0001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000000040)="18000000e2220000053873f7cd0619cdd7b0c361c24d849d84dfdb783d7dad6eb8c54f9ae47b1b9508e4c2800ed9d03dd2f597d2", 0x34, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x5}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000080)=ANY=[@ANYRESOCT]) getdents(r0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) 16:17:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x97ffffff00000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:17:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe00000bb}}}], 0x20}, 0x0) 16:17:10 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0xf, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:17:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b01fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x2000000) 16:17:10 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0xf, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) 16:17:10 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b11fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2551.035735] EXT4-fs (loop5): Unrecognized mount option "01777777777777777777777" or missing value 16:17:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1=0xe0000300}}}], 0x20}, 0x0) 16:17:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa188000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}]}}) 16:17:10 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x20}, 0x0) [ 2551.101634] EXT4-fs (loop5): Unrecognized mount option "01777777777777777777777" or missing value [ 2609.194652] syz-executor.0: page allocation failure: order:0, mode:0xa20(GFP_ATOMIC), nodemask=(null),cpuset=/,mems_allowed=0 [ 2609.197147] CPU: 1 PID: 14715 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 2609.197908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2609.199169] Call Trace: [ 2609.199458] dump_stack+0x107/0x163 [ 2609.199842] warn_alloc.cold+0x87/0x18d [ 2609.200259] ? zone_watermark_ok_safe+0x260/0x260 [ 2609.200768] ? wakeup_kcompactd+0x29/0x490 [ 2609.201212] ? wakeup_kswapd+0x208/0x5c0 [ 2609.201642] ? __zone_watermark_ok+0x2d0/0x2d0 [ 2609.202138] ? wake_all_kswapds+0x13f/0x2b0 [ 2609.202603] __alloc_pages_slowpath.constprop.0+0x1cbf/0x2210 [ 2609.203214] ? __kernel_text_address+0x9/0x30 [ 2609.203681] ? mark_lock+0xf5/0x2df0 [ 2609.204077] ? warn_alloc+0x120/0x120 [ 2609.204490] ? mark_lock+0xf5/0x2df0 [ 2609.204877] ? __zone_watermark_ok+0x2d0/0x2d0 [ 2609.205355] ? stack_trace_consume_entry+0x160/0x160 [ 2609.205893] __alloc_pages_nodemask+0x54f/0x680 [ 2609.206396] ? kasan_save_stack+0x1b/0x40 [ 2609.206831] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2609.207464] ? __lock_acquire+0xbc2/0x5b20 [ 2609.207907] alloc_pages_current+0x187/0x280 [ 2609.208378] ? SOFTIRQ_verbose+0x10/0x10 [ 2609.208814] allocate_slab+0x297/0x380 [ 2609.209228] ___slab_alloc+0x46c/0x700 [ 2609.209650] ? __sigqueue_alloc+0x1ee/0x560 [ 2609.210133] ? __sigqueue_alloc+0x130/0x560 [ 2609.210585] ? __sigqueue_alloc+0x1ee/0x560 [ 2609.211061] ? kmem_cache_alloc+0x30e/0x350 [ 2609.211513] ? should_failslab+0x5/0x10 [ 2609.211925] kmem_cache_alloc+0x30e/0x350 [ 2609.212369] __sigqueue_alloc+0x1ee/0x560 [ 2609.212813] __send_signal+0x5db/0x1040 [ 2609.213246] force_sig_info_to_task+0x2a0/0x3a0 [ 2609.213730] force_sig_fault+0xb0/0xf0 [ 2609.214148] ? force_sig_fault_to_task+0xe0/0xe0 [ 2609.214653] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 2609.215241] ? _down_write_nest_lock+0x150/0x150 [ 2609.215752] __bad_area_nosemaphore+0x270/0x320 [ 2609.216236] bad_area_access_error+0x29c/0x3b0 [ 2609.216723] do_user_addr_fault+0x640/0xc30 [ 2609.217183] exc_page_fault+0xa2/0x1a0 [ 2609.217602] ? asm_exc_page_fault+0x8/0x30 [ 2609.218047] asm_exc_page_fault+0x1e/0x30 [ 2609.218496] RIP: 0033:0x7ffdbbb668cf [ 2609.218894] Code: 00 00 00 18 6a b6 bb fd 7f 00 00 00 10 00 00 00 00 00 00 f2 1b 00 00 00 00 00 00 01 80 ad fb 00 00 00 00 f0 6b b6 bb fd 7f 00 <01> 38 c0 56 00 00 00 00 00 92 6e 40 00 00 00 00 00 c0 80 56 00 00 [ 2609.220851] RSP: 002b:00007f44b77e5220 EFLAGS: 00010206 [ 2609.221418] RAX: 0000000000000000 RBX: 00007ffdbbb668cf RCX: 00000000004c8d06 [ 2609.222197] RDX: 000000000026bf95 RSI: 000000000000022a RDI: 00000000004d09da [ 2609.222941] RBP: 000000000040417d R08: ffffffffffffffff R09: 000000000000000e [ 2609.223693] R10: 00000000004b5bc2 R11: 0000000000000246 R12: 000000000056bf8c [ 2609.224454] R13: 00007ffdbbb668cf R14: 00007f44b77e5300 R15: 0000000000022000 [ 2609.225213] Mem-Info: [ 2609.225483] active_anon:57 inactive_anon:57934 isolated_anon:0 [ 2609.225483] active_file:33202 inactive_file:48729 isolated_file:0 [ 2609.225483] unevictable:0 dirty:0 writeback:0 [ 2609.225483] slab_reclaimable:8690 slab_unreclaimable:157483 [ 2609.225483] mapped:78530 shmem:2112 pagetables:23385 bounce:0 [ 2609.225483] free:2076 free_pcp:404 free_cma:0 [ 2609.228857] Node 0 active_anon:228kB inactive_anon:231736kB active_file:132808kB inactive_file:194916kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:314120kB dirty:0kB writeback:0kB shmem:8448kB writeback_tmp:0kB kernel_stack:30720kB all_unreclaimable? yes [ 2609.231360] Node 0 DMA free:6488kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2609.234102] lowmem_reserve[]: 0 1621 1621 1621 [ 2609.234609] Node 0 DMA32 free:1816kB min:17788kB low:19448kB high:21108kB reserved_highatomic:0KB active_anon:228kB inactive_anon:231736kB active_file:132808kB inactive_file:194916kB unevictable:0kB writepending:0kB present:2080640kB managed:1665484kB mlocked:0kB pagetables:93540kB bounce:0kB free_pcp:1616kB local_pcp:248kB free_cma:0kB [ 2609.237895] lowmem_reserve[]: 0 0 0 0 [ 2609.238324] Node 0 DMA: 0*4kB 1*8kB (U) 1*16kB (U) 0*32kB 1*64kB (U) 0*128kB 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 1*4096kB (M) = 6488kB [ 2609.239750] Node 0 DMA32: 182*4kB (UME) 136*8kB (UME) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 1816kB [ 2609.241063] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2609.241990] 42599 total pagecache pages [ 2609.242435] 0 pages in swap cache [ 2609.242819] Swap cache stats: add 0, delete 0, find 0/0 [ 2609.243416] Free swap = 0kB [ 2609.243752] Total swap = 0kB [ 2609.244090] 524158 pages RAM [ 2609.244427] 0 pages HighMem/MovableOnly [ 2609.244880] 103810 pages reserved [ 2609.245270] SLUB: Unable to allocate memory on node -1, gfp=0xa20(GFP_ATOMIC) [ 2609.246076] cache: sigqueue, object size: 80, buffer size: 112, default order: 0, min order: 0 [ 2609.247003] node 0: slabs: 18229, objs: 656244, free: 0 [ 2609.247596] [ 2609.247601] ====================================================== [ 2609.247604] WARNING: possible circular locking dependency detected [ 2609.247606] 5.10.56 #1 Not tainted [ 2609.247609] ------------------------------------------------------ [ 2609.247611] syz-executor.0/14715 is trying to acquire lock: [ 2609.247613] ffffffff84d0a8a0 (console_owner){-.-.}-{0:0}, at: console_unlock+0x2e1/0xb30 [ 2609.247622] [ 2609.247624] but task is already holding lock: [ 2609.247626] ffff88805ca165d8 (&sighand->siglock){-...}-{2:2}, at: force_sig_info_to_task+0x6c/0x3a0 [ 2609.247634] [ 2609.247637] which lock already depends on the new lock. [ 2609.247638] [ 2609.247639] [ 2609.247642] the existing dependency chain (in reverse order) is: [ 2609.247643] [ 2609.247644] -> #4 (&sighand->siglock){-...}-{2:2}: [ 2609.247652] _raw_spin_lock_irqsave+0x36/0x50 [ 2609.247654] __lock_task_sighand+0xd3/0x2f0 [ 2609.247656] task_work_add+0x1db/0x2b0 [ 2609.247658] __io_async_wake+0x40b/0x8d0 [ 2609.247660] __wake_up_common+0x14c/0x4c0 [ 2609.247662] __wake_up_common_lock+0xd0/0x130 [ 2609.247664] tty_ldisc_lock+0x40/0xb0 [ 2609.247666] tty_ldisc_hangup+0x204/0x690 [ 2609.247669] __tty_hangup.part.0+0x50d/0x9b0 [ 2609.247670] tty_ioctl+0x103e/0x17c0 [ 2609.247672] __x64_sys_ioctl+0x196/0x210 [ 2609.247674] do_syscall_64+0x33/0x40 [ 2609.247677] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2609.247678] [ 2609.247679] -> #3 (&tty->read_wait){....}-{2:2}: [ 2609.247687] _raw_spin_lock+0x27/0x40 [ 2609.247689] io_poll_double_wake+0x1f8/0x550 [ 2609.247691] __wake_up_common+0x14c/0x4c0 [ 2609.247693] __wake_up_common_lock+0xd0/0x130 [ 2609.247695] tty_ldisc_lock+0x55/0xb0 [ 2609.247697] tty_ldisc_hangup+0x204/0x690 [ 2609.247699] __tty_hangup.part.0+0x50d/0x9b0 [ 2609.247701] tty_ioctl+0x103e/0x17c0 [ 2609.247703] __x64_sys_ioctl+0x196/0x210 [ 2609.247705] do_syscall_64+0x33/0x40 [ 2609.247707] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2609.247708] [ 2609.247710] -> #2 (&tty->write_wait){-.-.}-{2:2}: [ 2609.247717] _raw_spin_lock_irqsave+0x36/0x50 [ 2609.247720] __wake_up_common_lock+0xb4/0x130 [ 2609.247722] tty_port_default_wakeup+0x26/0x40 [ 2609.247724] serial8250_tx_chars+0x516/0xb40 [ 2609.247727] serial8250_handle_irq.part.0+0x3f1/0x4c0 [ 2609.247729] serial8250_default_handle_irq+0xb8/0x230 [ 2609.247731] serial8250_interrupt+0xf4/0x1a0 [ 2609.247734] __handle_irq_event_percpu+0x2ef/0x820 [ 2609.247736] handle_irq_event+0x102/0x290 [ 2609.247738] handle_edge_irq+0x249/0xd00 [ 2609.247740] asm_call_irq_on_stack+0x12/0x20 [ 2609.247742] common_interrupt+0xdd/0x190 [ 2609.247744] asm_common_interrupt+0x1e/0x40 [ 2609.247746] default_idle+0xe/0x10 [ 2609.247748] default_idle_call+0x87/0xd0 [ 2609.247750] do_idle+0x3a9/0x520 [ 2609.247752] cpu_startup_entry+0x14/0x20 [ 2609.247754] secondary_startup_64_no_verify+0xc2/0xcb [ 2609.247755] [ 2609.247757] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 2609.247764] _raw_spin_lock_irqsave+0x36/0x50 [ 2609.247767] serial8250_console_write+0x8dd/0xb20 [ 2609.247769] console_unlock+0x826/0xb30 [ 2609.247771] register_console+0x53d/0x800 [ 2609.247773] univ8250_console_init+0x3a/0x46 [ 2609.247775] console_init+0x361/0x4fa [ 2609.247777] start_kernel+0x2f2/0x49b [ 2609.247779] secondary_startup_64_no_verify+0xc2/0xcb [ 2609.247780] [ 2609.247781] -> #0 (console_owner){-.-.}-{0:0}: [ 2609.247789] __lock_acquire+0x29f6/0x5b20 [ 2609.247791] lock_acquire+0x197/0x490 [ 2609.247793] console_unlock+0x360/0xb30 [ 2609.247795] vprintk_emit+0x1da/0x4d0 [ 2609.247797] vprintk_func+0x8b/0x140 [ 2609.247798] printk+0xba/0xed [ 2609.247801] warn_alloc.cold+0x82/0x18d [ 2609.247803] __alloc_pages_slowpath.constprop.0+0x1cbf/0x2210 [ 2609.247806] __alloc_pages_nodemask+0x54f/0x680 [ 2609.247808] alloc_pages_current+0x187/0x280 [ 2609.247810] allocate_slab+0x297/0x380 [ 2609.247812] ___slab_alloc+0x46c/0x700 [ 2609.247814] kmem_cache_alloc+0x30e/0x350 [ 2609.247816] __sigqueue_alloc+0x1ee/0x560 [ 2609.247818] __send_signal+0x5db/0x1040 [ 2609.247820] force_sig_info_to_task+0x2a0/0x3a0 [ 2609.247822] force_sig_fault+0xb0/0xf0 [ 2609.247824] __bad_area_nosemaphore+0x270/0x320 [ 2609.247827] bad_area_access_error+0x29c/0x3b0 [ 2609.247829] do_user_addr_fault+0x640/0xc30 [ 2609.247831] exc_page_fault+0xa2/0x1a0 [ 2609.247833] asm_exc_page_fault+0x1e/0x30 [ 2609.247834] [ 2609.247836] other info that might help us debug this: [ 2609.247837] [ 2609.247839] Chain exists of: [ 2609.247840] console_owner --> &tty->read_wait --> &sighand->siglock [ 2609.247849] [ 2609.247851] Possible unsafe locking scenario: [ 2609.247852] [ 2609.247854] CPU0 CPU1 [ 2609.247856] ---- ---- [ 2609.247858] lock(&sighand->siglock); [ 2609.247863] lock(&tty->read_wait); [ 2609.247868] lock(&sighand->siglock); [ 2609.247872] lock(console_owner); [ 2609.247876] [ 2609.247877] *** DEADLOCK *** [ 2609.247878] [ 2609.247880] 2 locks held by syz-executor.0/14715: [ 2609.247881] #0: ffff88805ca165d8 (&sighand->siglock){-...}-{2:2}, at: force_sig_info_to_task+0x6c/0x3a0 [ 2609.247891] #1: ffffffff84deac20 (console_lock){+.+.}-{0:0}, at: vprintk_func+0x8b/0x140 [ 2609.247900] [ 2609.247901] stack backtrace: [ 2609.247904] CPU: 1 PID: 14715 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 2609.247909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2609.247910] Call Trace: [ 2609.247912] dump_stack+0x107/0x163 [ 2609.247913] check_noncircular+0x25f/0x2e0 [ 2609.247916] ? stack_trace_consume_entry+0x160/0x160 [ 2609.247918] ? print_circular_bug+0x470/0x470 [ 2609.247919] ? memcpy+0x39/0x60 [ 2609.247921] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 2609.247923] __lock_acquire+0x29f6/0x5b20 [ 2609.247926] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2609.247927] ? SOFTIRQ_verbose+0x10/0x10 [ 2609.247929] lock_acquire+0x197/0x490 [ 2609.247931] ? console_unlock+0x2e1/0xb30 [ 2609.247933] ? lock_release+0x6b0/0x6b0 [ 2609.247935] ? lock_downgrade+0x6d0/0x6d0 [ 2609.247937] ? do_raw_spin_lock+0x121/0x260 [ 2609.247939] ? rwlock_bug.part.0+0x90/0x90 [ 2609.247941] console_unlock+0x360/0xb30 [ 2609.247942] ? console_unlock+0x2e1/0xb30 [ 2609.247944] ? devkmsg_read+0x720/0x720 [ 2609.247946] ? lock_release+0x6b0/0x6b0 [ 2609.247948] ? do_raw_spin_unlock+0x4f/0x210 [ 2609.247949] ? vprintk_func+0x8b/0x140 [ 2609.247951] vprintk_emit+0x1da/0x4d0 [ 2609.247953] vprintk_func+0x8b/0x140 [ 2609.247954] printk+0xba/0xed [ 2609.247956] ? record_print_text.cold+0x16/0x16 [ 2609.247958] warn_alloc.cold+0x82/0x18d [ 2609.247960] ? zone_watermark_ok_safe+0x260/0x260 [ 2609.247962] ? wakeup_kcompactd+0x29/0x490 [ 2609.247964] ? wakeup_kswapd+0x208/0x5c0 [ 2609.247966] ? __zone_watermark_ok+0x2d0/0x2d0 [ 2609.247968] ? wake_all_kswapds+0x13f/0x2b0 [ 2609.247970] __alloc_pages_slowpath.constprop.0+0x1cbf/0x2210 [ 2609.247972] ? __kernel_text_address+0x9/0x30 [ 2609.247974] ? mark_lock+0xf5/0x2df0 [ 2609.247975] ? warn_alloc+0x120/0x120 [ 2609.247977] ? mark_lock+0xf5/0x2df0 [ 2609.247979] ? __zone_watermark_ok+0x2d0/0x2d0 [ 2609.247981] ? stack_trace_consume_entry+0x160/0x160 [ 2609.247983] __alloc_pages_nodemask+0x54f/0x680 [ 2609.247985] ? kasan_save_stack+0x1b/0x40 [ 2609.247988] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 2609.247990] ? __lock_acquire+0xbc2/0x5b20 [ 2609.247992] alloc_pages_current+0x187/0x280 [ 2609.247993] ? SOFTIRQ_verbose+0x10/0x10 [ 2609.247995] allocate_slab+0x297/0x380 [ 2609.247997] ___slab_alloc+0x46c/0x700 [ 2609.247999] ? __sigqueue_alloc+0x1ee/0x560 [ 2609.248001] ? __sigqueue_alloc+0x130/0x560 [ 2609.248002] ? __sigqueue_alloc+0x1ee/0x560 [ 2609.248005] ? kmem_cache_alloc+0x30e/0x350 [ 2609.248006] ? should_failslab+0x5/0x10 [ 2609.248008] kmem_cache_alloc+0x30e/0x350 [ 2609.248010] __sigqueue_alloc+0x1ee/0x560 [ 2609.248012] __send_signal+0x5db/0x1040 [ 2609.248014] force_sig_info_to_task+0x2a0/0x3a0 [ 2609.248015] force_sig_fault+0xb0/0xf0 [ 2609.248017] ? force_sig_fault_to_task+0xe0/0xe0 [ 2609.248020] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 2609.248022] ? _down_write_nest_lock+0x150/0x150 [ 2609.248024] __bad_area_nosemaphore+0x270/0x320 [ 2609.248026] bad_area_access_error+0x29c/0x3b0 [ 2609.248028] do_user_addr_fault+0x640/0xc30 [ 2609.248030] exc_page_fault+0xa2/0x1a0 [ 2609.248031] ? asm_exc_page_fault+0x8/0x30 [ 2609.248033] asm_exc_page_fault+0x1e/0x30 [ 2609.248035] RIP: 0033:0x7ffdbbb668cf [ 2609.248042] Code: 00 00 00 18 6a b6 bb fd 7f 00 00 00 10 00 00 00 00 00 00 f2 1b 00 00 00 00 00 00 01 80 ad fb 00 00 00 00 f0 6b b6 bb fd 7f 00 <01> 38 c0 56 00 00 00 00 00 92 6e 40 00 00 00 00 00 c0 80 56 00 00 [ 2609.248044] RSP: 002b:00007f44b77e5220 EFLAGS: 00010206 [ 2609.248048] RAX: 0000000000000000 RBX: 00007ffdbbb668cf RCX: 00000000004c8d06 [ 2609.248051] RDX: 000000000026bf95 RSI: 000000000000022a RDI: 00000000004d09da [ 2609.248054] RBP: 000000000040417d R08: ffffffffffffffff R09: 000000000000000e [ 2609.248057] R10: 00000000004b5bc2 R11: 0000000000000246 R12: 000000000056bf8c [ 2609.248059] R13: 00007ffdbbb668cf R14: 00007f44b77e5300 R15: 0000000000022000 VM DIAGNOSIS: 16:18:08 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffffff8145c00d RDX=0000000000000000 RSI=ffffffff8145c01f RDI=0000000000000005 RBP=ffff888055a261a0 RSP=ffff88805538fbd8 R8 =0000000000000000 R9 =ffffffff8544fb4f R10=0000000000000000 R11=0000000000000001 R12=0000000000000246 R13=00007eff5a0d5bd4 R14=ffff888055a261e0 R15=0000000000000000 RIP=ffffffff813f8654 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007eff5a0d6700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffde8a72b08 CR3=0000000054978000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00009fc0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=ffffffff0000000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=ffffffff0000000000000000000000ff XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=ffff00ffffffff00ffffffffffff0000 XMM08=00000000000000000000000000000000 XMM09=00000000000000ffffffffffffffffff XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff8226df7c RDI=ffffffff87679000 RBP=ffffffff87678fc0 RSP=ffff88806cf09c38 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0ecf24b R14=fffffbfff0ecf202 R15=dffffc0000000000 RIP=ffffffff8226dfd0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f44b77e5700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffdbbb668cf CR3=000000005dafc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=c200000000000000 4005 FPR6=c200000000000000 4005 FPR7=c700000000000000 4006 XMM00=00000000000000000000000000000000 XMM01=36161074a1ea3ff6dc959d70d555cd3c XMM02=9ff1a6421d26558ca1c813d4cc76ac8b XMM03=15e945d27afa1889df2ed1c6803a7a68 XMM04=0387365bee2fdb112572250e02a0254e XMM05=fb6ff4dac99923a3e77c4de5792eaf1a XMM06=3b102efb6ff4dac99923a3e77c4de579 XMM07=72f2c963cd43c8e755488ba75eb48685 XMM08=7465662035323a35333a35312032312f XMM09=89daf75c000000000000000000000000 XMM10=3c6ef372a54ff53a1f83d9ab5be0cd19 XMM11=00000000000000000000000000000000 XMM12=00000042000000420000004200000042 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000